Search for: "Kevin Hacker" Results 181 - 200 of 208
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 Mar 2011, 4:59 am by Rob Robinson
Andrew Peck) Technology and Tactics 5 Reason Why Google Uses Tape for Disaster Recovery – http://tinyurl.com/4stevdl (B&L Blog) 5 Reasons Why Hackers Want to Break into Your Email Server – http://tinyurl.com/4zaymrq (Paul Mah) Actionable Information Governance - http://tinyurl.com/4la5rer (Steve Bennett) Astroturfing the Message Boards - http://tinyurl.com/4g28lct (Ron Miller) Biles’ Hierarchy of Disaster Recovery Needs – http://tinyurl.com/4v9bbuc (Simon Biles)… [read post]
12 Oct 2011, 4:59 am by Rob Robinson
http://bit.ly/q1UD5l (Fulbright) Socially Aware: The Social Media Law Update (PDF) http://bit.ly/mQIDCt (Morrison & Foerster) Six Provocations for Big Data – http://bit.ly/nZh1pb (Danah Boyd, Kate Crawford) The History of Digital #Storage [INFOGRAPHIC] http://on.mash.to/purTmv (Matt Silverman) The Sequence and Chronology of Meet and Confer – http://bit.ly/p2OPlS (Orange Legal Technologies) Tracking the Trackers: Where Everybody Knows Your Username – http://bit.ly/okutPE… [read post]
9 Mar 2023, 4:24 am by Emma Snell
RESPONSE  House Speaker Kevin McCarthy yesterday declined an invitation to visit Ukraine from President Volodymyr Zelenskyy, who suggested the trip might challenge McCarthy’s “assumptions” about military aid. [read post]
19 Oct 2011, 4:40 am by Rob Robinson
http://bit.ly/q1UD5l (Fulbright) Socially Aware: The Social Media Law Update (PDF) http://bit.ly/mQIDCt (Morrison & Foerster) Six Provocations for Big Data – http://bit.ly/nZh1pb (Danah Boyd, Kate Crawford) The History of Digital #Storage [INFOGRAPHIC] http://on.mash.to/purTmv (Matt Silverman) The Sequence and Chronology of Meet and Confer – http://bit.ly/p2OPlS (Orange Legal Technologies) Tracking the Trackers: Where Everybody Knows Your Username – http://bit.ly/okutPE… [read post]
19 Oct 2011, 4:40 am by Rob Robinson
http://bit.ly/q1UD5l (Fulbright) Socially Aware: The Social Media Law Update (PDF) http://bit.ly/mQIDCt (Morrison & Foerster) Six Provocations for Big Data – http://bit.ly/nZh1pb (Danah Boyd, Kate Crawford) The History of Digital #Storage [INFOGRAPHIC] http://on.mash.to/purTmv (Matt Silverman) The Sequence and Chronology of Meet and Confer – http://bit.ly/p2OPlS (Orange Legal Technologies) Tracking the Trackers: Where Everybody Knows Your Username – http://bit.ly/okutPE… [read post]
8 Feb 2012, 7:39 am by Rob Robinson
EchoStar: First Department Analyzes When Duty to Preserve Evidence is Triggered – bit.ly/vZOPF2 (Kevin Broughel, James Worthington) What Causes Lawyers to Over-Preserve? [read post]
19 May 2016, 9:23 am by Rebecca Tushnet
 Andrew Moore, Kevin Amer, Regan Smith, Jason Sloan  40,000 written comments. [read post]
24 Oct 2020, 3:42 pm by Chuck Cosson
“Tool Without A Handle:  Spirituality, Virtue, and Technology Ethics” "If one loves righteousness, whose works are virtues,She teaches moderation and prudence, righteousness and fortitude, and nothing in life is more useful than these. [read post]
6 Nov 2018, 5:16 am by Matthew Kahn
Inflection points often go unnoticed, and in retrospect, it’s really not that surprising that the hackers’ testimony wasn’t appreciated for the dire warning that it represented. [read post]
8 Mar 2023, 4:59 am by Emma Snell
House Speaker Kevin McCarthy confirmed that he plans to meet Taiwan President Tsai Ing-wen in the U.S. this year. [read post]
24 Dec 2016, 5:26 pm by Ron Coleman
No one is in the dark for long regarding the views of Kevin O’Keefe and social networking for lawyers. [read post]
5 May 2022, 4:20 am by Emma Snell
Signup to receive the Early Edition in your inbox here. [read post]
12 Dec 2017, 1:18 pm by Ron Coleman
No one is in the dark for long regarding the views of Kevin O’Keefe and social networking for lawyers. [read post]
4 Jun 2014, 4:34 am by Kevin LaCroix
  As I have frequently noted on this site (refer, for example, here), cyber security issues increasingly are a board level concern, and indeed, recent shareholder litigation has shown that investors intend to hold board members accountable when data breaches cause problems for their companies. [read post]
15 Apr 2020, 3:16 pm by Kevin LaCroix
Cyber-related claims from shareholders or customers for alleged failure to comply with cybersecurity standards or breach notification laws in the event a security event, social engineering, or other fraud is perpetrated by hackers trying to exploit COVID-19-related vulnerabilities. [read post]
26 Dec 2018, 1:54 pm by Bob Ambrogi
And all over the world, hackers and entrepreneurs and others are working fervently to come up with the tech to solve these problems. [read post]
30 Sep 2022, 4:00 am by Jim Sedor
How Kevin McCarthy’s Political Machine Worked to Sway the GOP Field Raleigh News and Observer – Michael Scherer, Josh Dawsey, Isaac Arnsdorf, and Marianna Sotomayor (Washington Post) | Published: 9/27/2022 The political machine around U.S. [read post]
7 Jul 2012, 7:04 pm by Tom Goldstein
 It does not work; our tremendous Deputy Manager Max Mallory has spent months augmenting our capacity, and the hackers give up after a few minutes. [read post]
14 Sep 2020, 8:41 am by Nathaniel Sobel
On Aug. 19, Durham secured a guilty plea from former FBI attorney Kevin Clinesmith, who doctored an email that the government relied on in its fourth and final warrant application to surveil former Trump campaign aide Carter Page. [read post]
19 May 2016, 1:37 pm by Rebecca Tushnet
 Harley Geiger, Rapid7: we hire lots of white hat hackers, without legal assistance/knowledge; they get threat letters with vague DMCA threats. [read post]