Category: Threat Risk Assessment
Big Privacy / Privacy Impact Assessments / Threat Risk Assessment
Interview with Waël Hassan: Why Security and Privacy Must Work Together
Dr. Waël Hassan, chief editor of Transigram, is the founder of Ki Design, a consulting group specialized in big data solutions, privacy in design, cyber security, and privacy compliance. As a consultant […]
READ MORE
Law Firms See Insurance as Bulwark Against Data Breach
David Johnson had just finished meeting with a cybersecurity consultant about beefing up the company’s protections when he learned the servers had been hacked. As general counsel of Global Cash Access, a […]
READ MORE
Barclays breach after fraudsters had personal details of 13000 customers
Police found the memory stick by chance during arrest in Brighton, Sussex Found on it were names, dates of birth and addresses of 13,000 customers Barclays says there is no evidence the […]
READ MORE
Cyber-Risk Insurance Update
Corporate Insurance Law Howard B. Epstein and Theodore A. Keyes, New York Law Journal July 27, 2015 | Choose Existing Folder ]]> Your (Article, Chart, Blog) was successfully saved to your folder […]
READ MORE
Defining Damage Control in the Breach Epoch
In the past few weeks, we have seen ample evidence that technology breaches have replaced product recalls as the crisis management challenges of our present and future. The news has been replete […]
READ MORE
Barbarians at the Gate: Seventh Circuit Finds Article III Standing for Data Breach Class Actions
posted on: Friday, July 24, 2015 As a result of the Supreme Court’s decision in Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138, 1147 (2013), data breach class actions were largely […]
READ MORE
MOST COMMENTED
News
Why Our Fast-Changing World Requires Us to Change Collaboration
News
Forces of Bitcoin – Cryptography
News
Open Source Security Risks and Vulnerabilities to Know in 2019
News
Digital Supply Chain: Connecting the Dots of Design to Operate SCM Processes
News
Artificial Intelligence: Why it’s Evolving Faster than Ever
News
Why Memory-Centric Architecture Is The Future Of In-Memory Computing
News
Managing MySQL Server Logs: Rotate, Compress, Retain & Delete