Category «KM»

Pete Recommends – Weekly highlights on cyber security issues, January 23, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Site Published Every Face From Parler’s Capitol Riot Videos; DHS Gets Sued Over Its Social Media Surveillance Tactics; and Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes; and The risks of DDoS attacks for the public sector.

Subjects: Congress, Criminal Law, Cybercrime, Cybersecurity, Digital Archives, Financial System, KM, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, January 16, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The evolving threat of ransomware: Beware of cyber extortion in 2021; What if opting out of data collection were easy?; How 5G and AI Are Creating an Architectural Revolution; and Insecure wheels: Police turn to car data to destroy suspects’ alibis.

Subjects: AI, Criminal Law, Cybercrime, Data Mining, Information Architecture, KM, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, January 10, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: SolarWinds Hackers Got Into More Than 3,000 DOJ Email Accounts; Sealed U.S. Court Records Exposed in SolarWinds Breach; CISA:Hackers access to federal networks without SolarWinds; and State Department Approves Creation of Cyber Bureau.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, E-Government, Email Security, KM, Legal Research, Privacy, Software, Spyware, Technology Trends

LLRX December 2020 Issue

Articles and Columns for December 2020 Masks and mandates: How individual rights and government regulation are both necessary for a free society – Professor Martha Ackelsberg is political theorist – she studies how communities are organized, how power is exercised and how people relate to one another in and between communities. Through talking to friends, …

Subjects: KM

Pete Recommends – Weekly highlights on cyber security issues, December 27, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DOJ Accuses Zoom Exec of Acting on Behalf of Chinese Government; CISA Releases CISA Insights and Creates Webpage on Ongoing APT Cyber Activity; ACLU Sues For Info On FBI’s Encryption Breaking Capabilities; New tools to fight gift card scams; Officials shut down fake Moderna, Regeneron websites that allegedly stole users’ info for cyberattacks.

Subjects: AI, Cybercrime, Cybersecurity, Government Resources, Healthcare, KM, Privacy, Spyware

CI Takes Time

Research Attorney Caren Zentner Luckie discusses the many aspects of competitive intelligence and business development, importantly stating that it takes time to perform the work, and it takes even more time to learn which sources to use to find the information. She notes that CI also takes money to deliver comprehensive and accurate work product. Using a range of public and private sources, expert techniques, and a thorough understanding of the specific client requirements is critical to CI research.

Subjects: Business Research, Competitive Intelligence, KM, Legal Marketing, Legal Research

Pete Recommends – Weekly highlights on cyber security issues, December 12, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Brave browser-maker launches privacy-friendly news reader; Cloudflare And Apple’s New ‘Oblivious’ Protocol Could Mean an End to Snooping Telecos; Best practices for securing teleworkers; and Never click on this kind of Zoom invite. You’ll thank us forever.

Subjects: Cybercrime, Cybersecurity, KM, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues, December 5, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Fake calls from Apple and Amazon support: What you need to know; How to wipe your old Windows PC clean before getting rid of it; How a Grad Student Found Spyware That Could Control Anybody’s iPhone from Anywhere in the World; and Artificial Intelligence in Health Care: Benefits and Challenges of Technologies to Augment Patient Care.

Subjects: AI, Computer Security, Congress, Courts & Technology, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Legal Research, Legislative, Mobile Technology, Privacy, United States Law

Managing Metadata: An Examination of Successful Approaches

If Google can deliver results across the entire internet in seconds, why do I have so much trouble finding things in my organization?” asked Jonathan Adams, Research Director at Infogix, at the DATAVERSITY® DGVision Conference, December 2019. In a presentation titled, “I Never Metadata I did Not Like” Adams outlined successful approaches to understanding and managing metadata – as reported by Amber Lee Dennis.

Subjects: Business Research, Competitive Intelligence, E-Discovery, Information Architecture, Information Management, Information Mapping, KM, Search Engines, Technology Trends