Remove 11
Remove 2010 Remove IT Remove Paper Remove Security
article thumbnail

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

KrebsOnSecurity began this research after reading a new academic paper on the challenges involved in dismantling or disrupting bulletproof hosting services, which are so called because they can be depended upon to ignore abuse complaints and subpoenas from law enforcement organizations. biz: -Based in Asia and Europe. -It

Phishing 187
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

While digital voting systems are more secure today, what about the larger ecosystem, starting from the moment you register until your vote is counted? Who’s keeping those systems secure? In 2010, she was interviewed by O'Reilly Media. One of the premiere security researchers that Bowen invited to California was J.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

While digital voting systems are more secure today, what about the larger ecosystem, starting from the moment you register until your vote is counted? Who’s keeping those systems secure? In 2010, she was interviewed by O'Reilly Media. One of the premiere security researchers that Bowen invited to California was J.

article thumbnail

Legislation Aims to Expand Breach Notification Obligations

Hunton Privacy

In the past two months, lawmakers in three states have introduced legislation that would expand the scope of certain security breach notification requirements. Update : On February 11, 2011, BNA’s Privacy Law Watch reported that SB 1041 had failed and would not be carried over to the next legislative session. Virginia SB 1041.

Paper 40
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

While digital voting systems are more secure today, what about the larger ecosystem, starting from the moment you register until your vote is counted? Who’s keeping those systems secure? In 2010, she was interviewed by O'Reilly Media. One of the premiere security researchers that Bowen invited to California was J.

article thumbnail

Records Inventory 101:

ARMA International

Among these management issues are insufficient documentation of official acts, incorrect use of recordkeeping technologies, poor filing systems and maintenance standards, poor management of non-record items, insufficient identification of vital records, and insufficient records security policies.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Useful-tech-only 11/11/2008 12:16 PM Reply to Flag The article doesnt say. Thousands of business processes have already been digitized in an internal world where knowledge and work processes are critical.

Paper 88