Search for: "Target Corporation Store Design" Results 141 - 160 of 591
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
19 Nov 2018, 6:00 am by Nathaniel Sobel
  Then a few days later, the SEC announced the creation of a Cyber Unit within its Enforcement Division; the new unit would be tasked with “targeting cyber-related misconduct. [read post]
20 Jun 2023, 7:47 am by beng
” Indeed, Corporate Counsel magazine named data privacy litigation as the number-one class action trend to watch in 2023. [read post]
8 Jun 2023, 9:00 am by beng
” Indeed, Corporate Counsel magazine named data privacy litigation as the number-one class action trend to watch in 2023. [read post]
8 Dec 2014, 12:01 pm by Wells Bennett
For example, GSM carriers know their users’ A5 keys and store them in databases. [read post]
8 Jun 2010, 3:00 am by Guest Blogger
Simplification has its place in designing a corporate icon, but making it banal does not. [read post]
22 Dec 2016, 8:45 am by Andrew Keane Woods
  One can read this ruling as implicitly stating a preference for private (corporate) data retention policies over those mandated by a national government. [read post]
26 Apr 2021, 11:51 am by Jason Healey
Eight Days in September (and a few in October) As Bobby Chesney summarized previously, on Oct. 2, cybersecurity journalist Brian Krebs reported that “[o]ver the past 10 days, someone has been launching a series of coordinated attacks designed to disrupt Trickbot. [read post]
28 Oct 2019, 11:31 am by Nathan Swire
But the CLOUD Act also grants foreign governments, for the first time, the ability to request both stored communications and real-time communications—wiretaps—directly from private American corporations. [read post]
29 Oct 2012, 11:42 pm by Bala Krishnan
Apple is an American multinational corporation headquartered in Cupertino, California that designs, develops, and sells consumer electronics, computer software, and personal computers. [read post]
Conclusions In recent years, data and IT security issues have risen to the top of most financial and corporate risk registers. [read post]
29 Jul 2020, 11:47 am by Cory Doctorow
As the renowned security expert Bruce Schneier says, "Anyone can design a security system that works so well they can't think of a way to defeat it. [read post]
30 Nov 2010, 4:01 pm by Brandon D'Agostino
  The notion of preserve in place can be baffling if you consider that the systems on which counsel or custodians would preserve their relevant ESI were not designed with e-discovery in mind, and many of these systems were designed using a pre-determined matrix that rates storage based on reliability, cost, and speed. [read post]
8 Mar 2023, 1:42 pm by jeffreynewmanadmin
Transfers of assets from a PEP or Russian sanctions target to a family member, business associate, or associated trust around the same time as an arrest or a sanctions designation. [read post]
24 Feb 2007, 8:32 am
Even intentionally discriminatory silencing, if the requirements are targeted at smoking? [read post]
8 Jan 2020, 5:00 am by Eric Halliday
In 2006, OFAC again targeted Barakat’s network, placing sanctions on nine people, including two of his brothers, and two corporate entities for their role in Hezbollah’s fundraising activities. [read post]
11 Feb 2013, 5:25 pm by Sheppard Mullin
Others, with shrinking backlogs, will seek strength and economies through corporate combinations or “spin-offs. [read post]
28 Mar 2012, 7:59 am by McNabb Associates, P.C.
Chamber of Commerce, a major business lobbying group, and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter. [read post]
10 Sep 2015, 8:00 am
" We don't know for certain from which list the 2,500 people identified as gang members or terrorists were so designated, or who designated them, but a likely suspect is the FBI's Violent Gang and Terrorist Organization File (VGTOF) database. [read post]
21 Sep 2020, 6:08 am by Trey Herr, Garrett Hinck, Tim Maurer
The problem is that these programs, and their tendency to prescribe specific tenets of system design, slow a cloud provider’s ability to adapt their systems or provide novel technical approaches to deliver the same outcome. [read post]