Search for: "Cyber Imaging Systems, Inc." Results 1 - 20 of 60
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Apr 2013, 10:53 am by Steve Brachmann
Apple Seeks Patent for Parental Controls on Pre-Paid Debit CardsApple Inc. is always applying for protections on different device designs and computer systems. [read post]
14 Apr 2013, 5:30 am by Steve Brachmann
Related posts:Apple Seeks Patent for Parental Controls on Pre-Paid Debit CardsApple Inc. is always applying for protections on different device designs and computer systems. [read post]
30 May 2013, 4:35 am by Steve Brachmann
Related posts:Apple Awarded Processing Simulcast Data PatentYet again, it was another busy week for Apple Inc. at the U.S. [read post]
22 May 2013, 7:00 am by Steve Brachmann
Apple Seeks Patent for Parental Controls on Pre-Paid Debit CardsApple Inc. is always applying for protections on different device designs and computer systems. [read post]
31 Mar 2017, 9:00 am by Sarah Tate Chambers
Those applications often depend on the operating system, too, drawing on the operating system’s code to read and write files on the hard drive, draw images and text on the screen, or transmit information. [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
  Is there an accurate and current network topology diagram that is adequately documented, and if so, is it periodically re-assessed and revised as internal systems and external factors change? [read post]
13 Aug 2014, 3:59 am by Kevin LaCroix
(To see full-sized versions of the graphical images embedded in this post, please click on the images.) [read post]
6 Jan 2013, 10:37 am by Sai Vinod
Nobel Assembly Sued for Libel and Unfair Competition (Swaraj Paul Barooah)Image from hereDr. [read post]
4 Dec 2014, 7:21 am by Amy R. Worley
  This requires, among other things, a good data classification system. [read post]
27 Dec 2015, 4:00 am by Barry Sookman
LTD. v. uCOOL, INC. https://t.co/DyoGX8FYr2 -> Use of photo in blog post is fair use says US CA Katz v. [read post]
8 Aug 2013, 8:30 am by Joy Waltemath
This case appears to push the envelope, in terms of the EEOC’s level of aggressiveness in attempting to find as large a class as possible to include in a systemic lawsuit. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
  But cyber-attacks can be extraordinarily complicated and, once identified, demand a host of costly responses. [read post]
7 Mar 2023, 2:57 pm by Rob Robinson
To submit recommendations for consideration and inclusion in ComplexDiscovery’s cyber, data, and legal discovery-centric service, product, or research announcements, contact us today. [read post]
2 Oct 2017, 4:50 pm by Kevin LaCroix
The SEC’s disclosure that its EDGAR system had been had hacked was big news last week, as was the accompanying disclosure that the information accessed may have been used for improper trading. [read post]
15 Jan 2008, 12:36 am
Source: New York State Legislative Retrieval System (LRS), January 15, 2007 For your information we are posting the entire New York Legislature 2007 Chapter Law List as retrieved from the New York Legislative Retrieval System on January 15, 2008. [read post]
30 Mar 2017, 4:17 pm by Kevin LaCroix
  For instance, after a cybersecurity incident, law enforcement, regulators, vendors, partners, insurers, customers and others may:   Request forensic images of impacted systems; Demand copies of indicators of compromise; Mandate that their own auditors or examiners visit sites of infiltration and conduct their own audit and investigation; Want to participate in remediation planning; Seek interviews and interactions with IT personnel; Require briefings from a victim… [read post]