Quantcast
Channel: Detection – Big Data Tech Law
Browsing all 23 articles
Browse latest View live

A Skeleton Key – Beyond Politics! – to Clinton Email & Information Governance...

Secretary Clinton will likely do unintentionally for the duty to preserve electronic records in controversy what Edward Snowden did intentionally […]

View Article



Connected Cars as Privacy Platforms & Security Networks

NO SURPRISES! intoned the  digital advertising guru at the IAPP Global Privacy Summit, preaching the conventional wisdom of the business […]

View Article

IS the OPM Breach the Cyber Pearl Harbor?

When the disastrous data breach goes down, it bypasses the digital dossiers of the data brokers.  It turns out not to […]

View Article

The Privacy Platform Wars are ON!

The privacy platform battles we promised clarified and escalated last week as we learned how services may learn from advanced […]

View Article

Retailers, Hospitality: Ready for the payments liability shift on 10/1?

If you take payment cards and don’t  use chip technology by October 1st, the card brands will have you both […]

View Article


Signs of Cyber-Seriousness

Recent days have produced real and unprecedented signs of concerted efforts to begin to solve global cybersecurity problems.   Most […]

View Article

How LabMD Could Refocus the FTC on Real World Security

In fighting terrorism or fighting identity theft, the smart triple focus is on prevention of harm through good protection, detection […]

View Article

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than … Continue reading Top 10 Ways to Protect Your Company’s Data → The post Top 10 Ways to...

View Article


Ransomware Cuts Deep, in Life & in Coverage

By Jon Neiditz and David L. Cox 1.  Beyond Breaches With ransomware, cybersecurity in healthcare has gone far beyond HIPAA … Continue reading Ransomware Cuts Deep, in Life & in Coverage → The post...

View Article


Beyond Breach: Challenges in Cybersecurity & Coverage

By Jon Neiditz and David L. Cox Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, … Continue reading Beyond Breach: Challenges in Cybersecurity &...

View Article

Cybersecurity to Protect Knowledge Assets — Study with Ponemon

New Study Reveals that Companies Are Unprepared to Protect What Matters Most to Them How are you protecting your crown … Continue reading Cybersecurity to Protect Knowledge Assets — Study with Ponemon...

View Article

Cyber Winter is Here, and Coming to Regulation: New York’s Cybersecurity Rule...

Authors:  Jon Neiditz and Julie Grundman The State of New York’s response to two large cybersecurity breaches may fuel the transformation … Continue reading Cyber Winter is Here, and Coming to...

View Article

COMPANIES ARE BEGINNING TO PROTECT THEIR KEY ASSETS WITH CYBERSECURITY

It has been such an incredible pleasure and privilege to work with Larry Ponemon and the Ponemon Institute to track … Continue reading COMPANIES ARE BEGINNING TO PROTECT THEIR KEY ASSETS WITH...

View Article


The Privacy Platform Wars are ON!

The privacy platform battles we promised clarified and escalated last week as we learned how services may learn from advanced … Continue reading The Privacy Platform Wars are ON! → The post The Privacy...

View Article

Retailers, Hospitality: Ready for the payments liability shift on 10/1?

If you take payment cards and don’t  use chip technology by October 1st, the card brands will have you both … Continue reading Retailers, Hospitality: Ready for the payments liability shift on 10/1? →...

View Article


Signs of Cyber-Seriousness

Recent days have produced real and unprecedented signs of concerted efforts to begin to solve global cybersecurity problems.   Most … Continue reading Signs of Cyber-Seriousness → The post Signs of...

View Article

How LabMD Could Refocus the FTC on Real World Security

In fighting terrorism or fighting identity theft, the smart triple focus is on prevention of harm through good protection, detection … Continue reading How LabMD Could Refocus the FTC on Real World...

View Article


Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than … Continue reading Top 10 Ways to Protect Your Company’s Data → The post Top 10 Ways to...

View Article

Ransomware Cuts Deep, in Life & in Coverage

By Jon Neiditz and David L. Cox 1.  Beyond Breaches With ransomware, cybersecurity in healthcare has gone far beyond HIPAA … Continue reading Ransomware Cuts Deep, in Life & in Coverage → The post...

View Article

Beyond Breach: Challenges in Cybersecurity & Coverage

By Jon Neiditz and David L. Cox Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, … Continue reading Beyond Breach: Challenges in Cybersecurity &...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images