Tag: "network"

0
Another Example HIPAA violation – Failure to deactivate a personal computer on the server

Another Example HIPAA violation – Failure to deactivate a personal computer on the server

$4.8 million – largest HIPAA settlement to date Source: Lexology Author: Davis Wright Tremaine LLP On May 7, 2014, the U.S. Department of Health and Human Services, Office for Civil Rights (“OCR”) issued a press release announcing that two health care organizations—New York and Presbyterian Hospital (“NYP”) and Columbia University (“CU”)—agreed to resolve charges that they potentially […]

0
The Impacts of Corruption - Correlation Data and Policy Considerations

The Impacts of Corruption – Correlation Data and Policy Considerations

Working Group on Security and Corruption Source: http://carnegieendowment.org Systemic corruption has an unrecognized bearing on international security. Policymakers and private companies often pay insufficient attention to corruption when deciding what foreign and defense policies to pursue or where to invest. Greater understanding of the nature of acute corruption and its impact on global security would […]

0
Anonymous File Sharing

Local Anonymous File Sharing?

Dead Drop Un-cloud your files in cement! ‘Dead Drops’ is an anonymous, offline, peer to peer file-sharing network in public space. ‘Dead Drops’ is an anonymous, offline, peer to peer file-sharing network in public space. USB flash drives are embedded into walls, buildings and curbs accessible to anybody in public space. Everyone is invited to […]

0
Most Marketers are just Dumb

Most Marketers are just Dumb

This is How Facebook is Going to Die Yesterday, Facebook’s market value topped $100 billion. Zuck must be smitten his baby is now worth close to last year’s original IPO valuation. Market confidence, which Monday included a stock price increase of 1.9% to $41.34 with a daily high of $41.94 (the highest since the IPO), […]

0
Lack of Privacy vs. Controlling Exposure

Lack of Privacy vs. Controlling Exposure

Privacy Violations and the Sound of a Tree Falling in the Forest People have been lamenting over the end of online privacy since the first Internet wave back in the 90s.  Sun Microsystems CEO Scott McNealy sparked a controversy in 1999 when he said “You have zero privacy anyway.  Get over it.” Politicians, industry groups like […]

0
Personnel work at the Air Force Space Command Network Operations & Security Center

China Cyber-Espionage – 2/27/13

Experts: China has hacked most of Washington Start asking security experts which powerful Washington institutions have been penetrated by Chinese cyberspies, and this is the usual answer: almost all of them. The list of those hacked in recent years includes law firms, think tanks, news organizations, human rights groups, contractors, congressional offices, embassies and federal […]

0
Pope Benedict XVI attends the celebration of Ash

Why the Pope may have Resigned – 2/27/13

Pope resigned after findings of blackmail, corruption, gay sex at Vatican, reports say The Italian media is reporting that Pope Benedict XVI resigned after receiving the results of an internal investigation, delivered in a 300-page, two-volume dossier, that laid bare a sordid tale of blackmail, corruption and gay sex at the Vatican. The respected Italian […]

0
China Slapped On The Wrist For Stealing Secrets

China Slapped On The Wrist For Stealing Secrets – 2/20/13

Cybersecurity: Experts Wonder If New Obama Order Goes Far Enough The New York Times’ publication of sensational charges by security contractor Mandiant about Chinese cyberattacks directed by a unit of the People’s Liberation Army led experts to note that the threat of cyberattacks is growing worldwide. Besides the New York Times Co. (NYSE:NYT), other companies, […]

0
China infiltrates U.S. Media

China infiltrates U.S. Media – 2/7/13

US media on edge after web attacks Experts detect military-style cyber raids on two of America’s biggest newspapers by Chinese hackers. There are growing fears about Chinese cyber attacks on Western media outlets after two of America’s largest newspapers said Chinese hackers had infiltrated their computer systems. Hours after the New York Times said Chinese […]

0
Democrats call for Internet 'freedom,' cybersecurity legislation

Cyber-Security Legislation – 9/8/12

Democrats call for Internet ‘freedom,’ cybersecurity legislation   The U.S. Democratic Party embraced its version of Internet freedom and called for new cybersecurity legislation in its platform released as the party begins its convention in Charlotte, North Carolina. The Democratic platform, released late Monday, calls for an Internet that is “secure and reliable and that […]

0
INFOGRAPHIC - Facebook And Twitter 3/11/12

INFOGRAPHIC – Facebook And Twitter 3/11/12

INFOGRAPHIC: Recruiters Aren’t Using Facebook And Twitter LinkedIn overwhelmingly trumps Facebook and Twitter as the social network recruiters use to search for job candidates, with 48 percent using LinkedIn alone, according to a recent study by Bullhorn, Inc. Facebook is the least-used network by recruiters, although more candidates are looking to use it as a […]