hbr.org – We’ve made our coronavirus coverage free for all readers. To get all of HBR’s content delivered to your inbox, sign up for the Daily Alert newsletter. Every leader knows that communication during a c… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1288840553430482947
EDPB Response to MEPs in ‘t Veld, Chastel, Körner, Pagazaurtundúa, Šimečka & Strugariu regarding the possible extension of the Prüm framework
edpb.europa.eu – EDPB Response to MEPs in ‘t Veld, Chastel, Körner, Pagazaurtundúa, Šimečka & Strugariu regarding the possible extension of the Prüm framework EDPB Response to MEPs in ‘t Veld, Chastel, Körner, Pagaza… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1288938924824563714
What is pretexting? Definition, examples and prevention
csoonline.com – Pretexting is form of social engineering in which an attacker tries to convince a victim to give up valuable information or access to a service or system. The distinguishing feature of this kind of a… Tweeted by @NetDiligence
Technology-Assisted Review Is Not Compulsory, but Litigants’ Reluctance to Accept New E-Discovery Technologies Comes With Consequences | E-Discovery Law Alert
ediscoverylawalert.com – A Special Master appointed to administer discovery disputes in In re Mercedes-Benz Emissions Litigation, pending in the District of New Jersey, rejected Plaintiffs’ application to compel Defendants t… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1289169157531942923
1861977 – RHSA-2020:3216 grub2 security update renders system unbootable
bugzilla.redhat.com – This site requires JavaScript to be enabled to function correctly, please enable it. Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1289149068006969345
Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19
securitymagazine.com – Fifty-six (56) percent of employees are using their personal computers as their company’s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index r… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1288490801710993408
BDO Launches Athenagy™—The New Business Intelligence Platform for Managed Services
businesswire.com – CHICAGO–(BUSINESS WIRE)–BDO USA, LLP, one of the nation’s leading accounting and advisory firms, today announced the launch of Athenagy™, its proprietary business intelligence platform for legal pr… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1288520525548060672
Technical Challenges of IoT Cybersecurity in a Post-COVID-19 World
darkreading.com – Day-to-day business activities have changed pervasively and quickly because of the pandemic, and many experts already have written about the impact on the security world. Most of those have focused o… Tweeted by @cyberintel https://twitter.com/cyberintel/status/1288732404774055936
Information governance: Why you need it, how to do it
techgenix.com – What does good information governance look like? How can organizations achieve it? Especially for businesses today, where technology and data are at the heart of what they are and do, information gov… Tweeted by @DataScienceFr https://twitter.com/DataScienceFr/status/1288737149995622401
Cyber-Incidents Surge 366% at NASA
infosecurity-magazine.com – Cybersecurity incidents at NASA increased by 366% last year as the organization’s cybersecurity budget was slashed by $3.1m. New research published yesterday by virtual network provider AtlasVPN foun… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1288127359766339593
Docker security
docs.docker.com – There are four major areas to consider when reviewing Docker security: Docker containers are very similar to LXC containers, and they have similar security features. When you start a container with d… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1288207647846445056
paulch’s blog
blog.paulch.ru – One of the main function we are going to be exploring, where the whole TCP/IP emulation starts, is void slirp_input(PNATState pData, struct mbuf *m, size_t cbBuf) (code). Each processed network packe… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1288178007505375233
Federal Judge Finds it is Counsels’ Absence of Good Faith and Cooperation Causing an Increase in Duration and Expense of Litigation | All About eDiscovery
allaboutediscovery.com – Aldinger v. Alden State Bank is a good reminder of counsel’s obligation to be cooperative in the discovery process. Aldinger, an employment discrimination case pending in the United States District C… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1288423280148467712
Sometimes they come back: exfiltration through MySQL and CVE-2020-11579
shielder.it – Let’s jump straight to the strange behavior: up until PHP 7.2.16 it was possible by default to exfiltrate local files via the MySQL LOCAL INFILE feature through the connection to a malicious MySQL se… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1288413456320925696
Exploiting popular macOS apps with a single “.terminal” file.
medium.com – You may notice that the scenario relies on user interaction and requires convincing the user to open the file with phishing. Unfortunately, the state of UX security in many chat apps is pretty bad, a… Tweeted by @TheHackersNews
Socha’s Weekly Trend Report – July 27, 2020
blog.aceds.org – Notes on recent trends in e-discovery, data privacy, and the use of technology to enhance the practice of law. Organization: ACEDS Speakers: James C. Francis IV, Christine Payne (Redgrave), Michelle … Tweeted by @acedsonline https://twitter.com/acedsonline/status/1287812776912728064
Learn Machine Learning and AI – Online Training Program @ 93% OFF
thehackernews.com – Within the next decade, artificial intelligence is likely to play a significant role in our everyday lives. Machine learning already powers image recognition, self-driving cars, and Netflix recommend… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1288101409213173766
Undetectable Linux Malware Targeting Docker Servers With Exposed APIs
thehackernews.com – Cybersecurity researchers today uncovered a completely undetectable Linux malware that exploits undocumented techniques to stay under the radar and targets publicly accessible Docker servers hosted w… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1288093396725202945
Much Ado About Something? The Hype Cycle for Legal and Compliance Technologies (2020)
complexdiscovery.com – Hype Cycle for Legal and Compliance Technologies, 2020 Published on July 20, 2020, by the research and analyst firm Gartner, the new Hype Cycle for Legal and Compliance Technologies, 2020 research (G… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1288085384409350144
FCPA Resource Guide
justice.gov – A Resource Guide to the U.S. Foreign Corrupt Practices Act, Second Edition Released by the Department of Justice and the Securities and Exchange Commission, A Resource Guide to the U.S. Foreign Corru… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1287065804496867329