“Thank You” to 2 Legal Leaders that I Respect

There are many ways to honor someone. For me, one of the greatest privileges is knowing that others have found some value or usefulness in my work, especially by referencing it to others. What is unfortunate, however, is when you did not learn about it for quite some time and realize you never properly thanked [...]

WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7

See also:  WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS? https://youtu.be/MR1G6JO0is0

Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing

Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it [...]