Remove 2013 Remove Computer and Electronics Remove Education Remove Privacy Remove Security
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. It made sense.

article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Mister Chairman and Members of the Committee, thank you for the opportunity to testify today concerning the security of credit data. My name is Bruce Schneier, and I am a security technologist. Before the. Committee on Energy and Commerce.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Source (New) Engineering Japan Yes >5 TB Array Networks Source (New) Cyber security USA Yes 2.5 TB Turtlemint Source (New) Insurance India Yes 1,800,000 Chunghwa Telecom Source (New) Telecoms Taiwan Yes 1.7

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Last year, eDiscovery Daily published 66 posts related to eDiscovery and data privacy case decisions and activities over the past year, covering 56 unique cases ! Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. 2013: Part 1 , Part 2 , Part 3 , Part 4.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Los Alamos National Security, LLC et. 2013: Part 1 , Part 2 , Part 3 , Part 4. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. Wilkinson, Jr.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Security enthusiast and Linux evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. Binni Shah | @binitamshah.