Search for: "Command and Security Corporation" Results 361 - 380 of 1,019
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
6 May 2019, 7:12 am by William Ford
European Command; and Col. [read post]
1 May 2019, 7:51 am
"Plaintiffs expressly do not base their claims against the parent companies on a breach of liability, the Anglo-Saxon legal entities piercing the corporate veil and crossing the corporate veil, shareholder liability or tort or negligence. [read post]
25 Mar 2019, 6:11 am by Scarlet Kim, Paulina Perlin
In July 2017, Privacy International and Yale Law School’s Media Freedom & Information Access Clinic (MFIA) filed a lawsuit against the National Security Agency, the Office of the Director of National Intelligence (ODNI), the State Department, and the National Archives and Records Administration seeking access to records related to the Five Eyes alliance under the Freedom of Information Act. [read post]
11 Mar 2019, 11:29 am by Peter Margulies
(See p. 54 of the report issued by the RAND Corporation supporting Carter’s decision.) [read post]
28 Feb 2019, 9:26 am by Matthew Kahn
Paul Rosenzweig analyzed Cyber Command’s election day operation against the Internet Research Agency. [read post]
14 Feb 2019, 11:50 am by Alexis Hancock
Examples include collection of real-time location data on Google Maps and audio-based searches and commands via Google Assistant. [read post]
5 Feb 2019, 1:13 pm by Nathan Matias
Afloat, Sharif most recently served as the commanding officer, USS McCAMPBELL (DDG 85), an Aegis guided missile destroyer. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
In most cases of ransomware, the fact pattern is the same: Ransomware attackers break into a corporate system and encrypt, or lock-up, a corporate victim’s data. [read post]
20 Jan 2019, 11:43 pm
(Pix © Larry Catñá Backer; Bronzino Martirio di San Lorenzo, 1565-69, Florence )Judges and lawyers tend to serve as the worker bees of the large jurisprudential colonies of semiotic communities ("They do all the work in the hive, and they control most of what goes on inside. [read post]
There is more than one well-documented instance of white-hat hackers commandeering non-autonomous vehicles through their radio systems, taking control of the windshield wipers and, more shockingly, the braking systems. [read post]
4 Jan 2019, 5:10 am by Annie I. Antón , Justin Hemmings
  However, the state-owned and -subsidized Chinese company CRRC Corporation Ltd. [read post]
17 Dec 2018, 3:14 pm by Kevin LaCroix
In fact, I predicted the coming of SEC enforcement actions against Khaled and Mayweather over seven months ago in an article entitled, “Ten Crypto-Caveats Floyd Mayweather and DJ Khaled Should Have Heard From Their Lawyers,” published in The Harvard Law School Forum on Corporate Governance and Financial Regulation. [read post]
6 Dec 2018, 2:00 am by Susan Brady
Every day, cybercriminals use an assorted arsenal to try to steal data, corporate assets, and confidential information from companies worldwide. [read post]
4 Dec 2018, 9:16 am
(Pix credit: Mexico: López Obrador and a memorable speech in the Zócalo: “With the people everything, without the people nothing” (Full text))I have been writing about the most interesting speech delivered to the representatives of the Mexican state assembled in Congress at an gathering to which a large number of foreign representatives were also in attendance. [read post]
1 Dec 2018, 12:26 pm by Anushka Limaye, Mikhaila Fogel
Cyber Command vision and the Department of Defense Cyber Strategy. [read post]
29 Nov 2018, 1:06 pm by Anushka Limaye
Cyber Command vision and the Department of Defense Cyber Strategy. [read post]
27 Nov 2018, 9:29 am by Jack Sharman
  Despite lip-service to soft concepts in compliance programs, most come down to crypto-Scriptural commands. [read post]