article thumbnail

Why Paper Receipts are Money at the Drive-Thru

Krebs on Security

A few years back, I attended a presentation by an investigator with the criminal division of the U.S. Too often, organizations victimized by employee theft shy away from reporting it because they’re worried that any resulting media coverage of the crime will do more harm than good.

Paper 317
article thumbnail

UK government’s response to AI White Paper consultation: next steps for implementing the principles

Data Protection Report

The authors acknowledge the assistance of Salma Khatab, paralegal, in researching and preparing some aspects of this blog The UK Department for Science, Innovation, and Technology (DSIT) has published its response to its consultation on its white paper, ‘A pro innovation approach to AI regulation ’ (the Response).

Paper 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

e-Records 2020 Call for Presentations

The Texas Record

TSLAC and DIR are looking for learner-focused presentations designed to engage virtual audiences. Prior experience presenting online is not required. We need virtual presenters! Requested Presentation Formats. A presentation must include 1-2 presenters or 3-4 panelists with a moderator.

article thumbnail

e-Records 2021 Call for Presentations

The Texas Record

TSLAC and DIR are looking for learner-focused presentations designed to engage virtual audiences. Prior experience presenting online is not required. We need virtual presenters! Requested Presentation Formats. A presentation must include 1-2 presenters or 3-4 panelists with a moderator.

article thumbnail

The Essential Guide to Analytic Applications

Embedding dashboards, reports and analytics in your application presents unique opportunities and poses unique challenges. We interviewed 16 experts across business intelligence, UI/UX, security and more to find out what it takes to build an application with analytics at its core.

article thumbnail

New Lattice Cryptanalytic Technique

Schneier on Security

A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. One, this paper has not yet been peer reviewed. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their security on hard lattice problems. A few things to note.

Paper 89
article thumbnail

CIPL Publishes White Paper on the Interplay Between the Draft EU Digital Markets Act and the GDPR

Hunton Privacy

On December 6, 2021, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published a white paper on “ Bridging the DMA and the GDPR – Comments by the Centre for Information Policy Leadership on the Data Protection Implications of the Draft Digital Markets Act ” (the “White Paper”).

Paper 111