Videocast: 2020 – The year of digital taxation
Government data mining leads to more aggressive investigations
Episode 23: Using “People Analytics” to Make Smart Business and Corporate Culture Decisions
Day 19 of One Month to More Effective Continuous Improvement-Use of Social Media for Continuous Improvement
BakerHostetler Partner Alan Friel Talks Big Data and Data Collection
PATIENT PRIVACY IN AN ERA OF SOCIAL MEDIA
After a data breach, organizations need to understand the scope of the incident in order to quickly resolve it and ensure they are able to meet notification requirements. The urgency often leads to the misguided belief that...more
Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more
We predicted last year that hackers would become more malicious in the future, not only stealing and selling data for nefarious purposes, but actually destroying data and even systems. That reality hit email provider VFEmail...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
In the 1969 film Butch Cassidy and the Sundance Kid, after Butch and Sundance rob Union Pacific Railroad (“Union Pacific”) the first time, Union Pacific employs a stronger safe. After Butch and Sundance rob Union Pacific a...more