A Tale of Two Poorly Designed Cross-Border Data Access Regimes

On Tuesday, the European Commission published two legislative proposals that could further cement an unfortunate trend towards privacy erosion in cross-border state investigati­ons. Building on a foundation first established by the recently enacted U.S. CLOUD Act, these proposals compel tech companies and service providers to ignore…

New York Judge Makes the Wrong Call on Stingray Secrecy

A New York judge has ruled that the public and the judiciary shouldn’t second-guess the police when it comes to secret snooping on the public with intrusive surveillance technologies. He couldn’t be more wrong.  A core part of EFF’s mission is questioning the decisions of…

5 Considerations for Next-gen Customer Care

How can you offer the next-gen experience that customers are looking for? 72 percent of businesses say that improving the customer experience is their top priority.¹ Connecting how, when, and where customers want has become business critical. Engage with Customers on Their Terms. Consider how…

Survey finds that energy security professionals are concerned about ‘catastrophic failure’ caused by cyber attacks

… are concerned that a successful cyber attack could cause a catastrophic failure … recognition of the physical threat cyber attacks present against the energy and … security investments because of ICS-targeted attacks like Trisis/Triton, Industroyer … VISIT THE SOURCE ARTICLE Survey finds that energy…

Atlanta spending $2.7 million on ransomware cyber attack; ransom was $50,000

… to a ransomware cyber attack that crippled some city services. Attackers demanded a … contracts in response to the attack, including two $1 million agreements … with the impact of the attack since late March. Systems that … city officials in investigating the attack….

DLD to use Artificial Intelligence to verify Ejari contracts

… that it will start using Artificial Intelligence (AI) to verify Ejari contracts … with the ‘UAE Strategy for Artificial Intelligence’ launched by HH Sheikh Mohammed … VISIT THE SOURCE ARTICLE DLD to use Artificial Intelligence to verify Ejari contracts

Take the Mundane Out of Your Meetings: Cisco Enhances Webex to Include More of What You Do Every Day to Get Great Work Done

“Let’s talk about it—I’ll set up a Webex!” Ever heard (or said) that sentence? More RSS Feed: newsroom.cisco.com/rss-feeds … VISIT THE SOURCE ARTICLE Take the Mundane Out of Your Meetings: Cisco Enhances Webex to Include More of What You Do Every Day to Get Great…

Russian cyber attack should be met by counter-strikes

… jointly announced months-long, state-sponsored cyber attacks by Russian hackers that targeted millions of … cyber attacks against Western targets. The advantages for these states are clear: cyber attacks … the attack, Iran was among several counties that recently experienced a cyber attack … VISIT THE…

Copyright © 2018 NETWORKFIGHTS.COM