blog.netwrix.com – The EU General Data Protection Regulation (GDPR) grants individuals the right to find out what personal data an organization (called a data controller) holds about them by submitting a data subject a… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1280813138011656192
Cato MDR: Managed Threat Detection and Response Made Easy
thehackernews.com – Lately, we can’t help noticing an endless cycle where the more enterprises invest in threat prevention; the more hackers adapt and continue to penetrate enterprises. To make things worse, detecting t… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1280800985267372032
Balancing Risk with Cyber Insurance: Through the eyes of the General Counsel & CIO
advisenltd.com – Discussing the value of balancing risk transfer to cyber insurance during uncertain times. Putting a price on security during these times can be extremely difficult. Accurate prioritization and risk … Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1280184732521766913
Legal Ethics and Technology: The Duty of Competence
blog.aceds.org – As lawyers we must be guided by the Rules of Professional Conduct in all aspects of our work. Today that includes competence in relevant technology. Technology is deeply embedded in contemporary lega… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1280195134118924288
Unisys
secureoutreach.unisys.com – Country* Please select Australia New Zealand Singapore Malaysia Philippines India ————– Afghanistan Åland Islands Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua an… Tweeted by @MyPhDResearch https://twitter.com/MyPhDResearch/status/1280414490287378432
Responding to a DSAR Request | JD Supra
jdsupra.com – In a previous post, I discussed what a DSAR is, the laws that such requests arose from, and the importance of having a systematic approach to dealing with a request. Now let us outline the process in… Tweeted
IoT News – Microsoft Takes on CyberX Security To Boost and Manage Existing IoT Devices – IoT Business News
iotbusinessnews.com – By Ludovic F. Rembert, Head of Research at Privacy Canada. In the year 2019, we witnessed a widespread adoption of the Internet of Things, or IoT. More homes and businesses are now equipped with IoT … Tweeted by
The Unique Path to e-Discovery: One Engineer’s True Story
relativity.com – Raise your hand if you ended up in e-discovery by happenstance. The truth is, most of us didn’t go to school with big plans to join this incredibly niche industry—especially those in the supporting b… Tweeted by @RelativityHQ
C# extension methods and testability
bulldogjob.pl – Extension methods are a fascinating feature in C# that were introduced in C# 3.0. They are extremely useful as they enable us to add functionality to existing types without creating derived types, re… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1280110029123788801
DSARs 101: What to Expect When Doing Business with EU Customers | JD Supra
jdsupra.com – For any organization that deals with privacy issues in the European Union and other privacy-centric jurisdictions like the United Kingdom, an effective information governance program is a must. A pro… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1280106480650371072
Adobe, Mastercard, Visa warn online store owners of Magento 1.x EOL
zdnet.com – Cyber security 101: Protect your privacy from hackers, spies, and the government Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodi… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1280068572358868992
Use of cloud collaboration tools surges and so do attacks
csoonline.com – The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been rapid adoption and integration of c… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1280068190127742983
Microsoft Confirms Serious New Security Problem For Windows 10 Users
forbes.com – Microsoft has now joined Intel in confirming a newly reported security vulnerability with Thunderbolt ports, one that enables an attacker with physical access to a PC to modify the port’s controller … Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1279475477577596931
Why Privacy Matters | HeyDataData
heydatadata.com – Text Below reprinted from Privacy in the Age of Big Data, by Theresa Payton and Ted Claypoole, published by Rowman & Littlefield. Although it seems that every day less people care about their privacy… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1279762009517629440
Firms Expect Working from Home to Triple
frbatlanta.org – The coronavirus and efforts to mitigate its impact are having a transformative impact on many aspects of economic life, intensifying trends like shopping online rather than visiting brick-and-mortar … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1278724679096811520
Weakness in Zoom for macOS allows local attackers to hijack camera and microphone
csoonline.com – The Zoom video conferencing client for macOS does not take full advantage of the application hardening features the operating system offers, which could allow local malware to elevate its privileges … Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1278752189448675328
Tech Strategies to Keep Your Distributed Teams on Track
relativity.com – Even in the best of times, maintaining high standards of quality, consistency, and productivity in your e-discovery project is an ongoing challenge. With changing circumstances and a need to transiti… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1278691376083992578
Reset Normal – The Adecco Group
adeccogroup.com – Arguably, the Covid-19 pandemic changed the world of work more radically than any other single event in our working lifetime. But how much of this change will be enduring, where will we see permanent… Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1278761622480224261
The Expanding Role and Influence of the Modern Litigation Support or E-Discovery Manager
blog.aceds.org – ACEDS Advisory Board Chair Ari Kaplan Interviews Sonya Judkins, ACEDS Advisory Board Member and Manager of Legal Discovery/Compliance at T-Mobile What has been the typical role of a litigation suppor… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1278706953427070979
Ransomware Incident Response Plan | NetDiligence
netdiligence.com – Ransomware is the number one cause of cyber claims and lost business income for small and medium enterprises (SMEs), and remains one of the biggest threats to businesses around the world. According t… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1278390126704558086