background preloader

HTTB Morning Ed. Direct Distributions (V2)

Facebook Twitter

Hackers could destroy Curiosity – Fudzilla. Hackers could destroy CuriosityFudzillaIn another case the hackers gained complete control of a NASA system, allowing them to delete or modify files, upload hacking tools, and modify system logs to conceal their actions.

Hackers could destroy Curiosity – Fudzilla

See on www.fudzilla.com. Official: Egypt forces detain 2, seize computer in Sinai – Ma’an News Agency. Ma’an News AgencyOfficial: Egypt forces detain 2, seize computer in SinaiMa’an News AgencyEL-ARISH, Egypt (Ma’an) — Egyptian security officials say they seized documents detailing the names and operational information of militants in Sinai on… See on www.maannews.net.

Official: Egypt forces detain 2, seize computer in Sinai – Ma’an News Agency

Pair charged in brazen identity theft scheme – Dubuque Telegraph Herald. 9 Popular IT Security Practices That Don’t Work – Computerworld India. 9 Popular IT Security Practices That Don’t WorkComputerworld IndiaWhen it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing.

9 Popular IT Security Practices That Don’t Work – Computerworld India

See on www.computerworld.in. Hong Kong Exchanges Denies Report of Printer Hacking Attack – Businessweek. A Different Flavor of TAR at TCG Chicago Leadership Breakfast. Greg Buckles Attendance at the Houston bDiscovery gathering fluctuates wildly based on weather, spring break and many other factors.

A Different Flavor of TAR at TCG Chicago Leadership Breakfast

This evenings gathering was small, but rich in experience with a wild variety of clients, partners and employers. As happens so often at LTNY or anywhere eDiscovery professionals and alcohol mix, the conversation quickly devolves into carefully sanitized stories of bonehead mistakes, amazing bills, print parties, Luddite partners, cookie bearing copy reps and more. eDiscovery old-timers know better than to name names or give any specific details that could even hint at the identities of the parties, but these stories are more than entertainment. They comprise our tribal wisdom. They can educate the next generation of eDiscovery professionals so that they are not doomed to repeat the same mistakes we made in the 1990’s and too many of our clients continue to make today. Categories: EDD Services Processing-ECA. Autonomy Data Protection Solution Passes 10,000 Customer Milestone. C2C Meets Expanding Email Data Management Requirements With ArchiveOne 6.5.

WESTBOROUGH, MA--(Marketwire -08/14/12)- C2C, a leading provider of email, file, messaging and eDiscovery solutions, today announced the latest release of its ArchiveOne email archiving and management platform.

C2C Meets Expanding Email Data Management Requirements With ArchiveOne 6.5

With enhanced features for data archiving and disposition, PST file management and dynamic mobile access to email data, ArchiveOne 6.5 achieves "real world" email management for the way today's businesses work. "Now, purpose-built archive systems are swiftly becoming a mainstay because saving information is no longer enough -- business users need to access it," said Brian Babineau, Vice President, Research and Analyst Services, Enterprise Strategy Group. "The steady pace of data growth, rapidly changing compliance requirements, and legal demands dictate a shift to better solutions that help automate policy-based information discovery, tracking, retention, AND expiration.

Companies have to start thinking about what's next in archiving. Cloud Survey by Kroll Ontrack Reveals a Surge in Cloud Storage and Virtualization Adoption; Shortage of Proactive Protocols to Protect This Data. MINNEAPOLIS--(BUSINESS WIRE)--While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to ensure proper protocols are in place to protect this data.

Cloud Survey by Kroll Ontrack Reveals a Surge in Cloud Storage and Virtualization Adoption; Shortage of Proactive Protocols to Protect This Data

This is a key finding from a recent survey conducted by Kroll Ontrack, the leading provider of data recovery, e-discovery and information management, of 367 enterprise and services providers. “Virtualization is the engine of cloud technology. If virtualization fails, the cloud fails” Forty-nine percent of organizations reported experiencing some type of data loss in the last year, but not necessarily from the cloud. Fifty-five percent denoted data was lost from a traditional storage device in contrast to 26 percent who reported a data loss from a virtual environment, 3 percent who reported a loss from the cloud and 16 percent who experienced data loss from both a virtual environment as well as the cloud. New Florida E-Discovery Rules Impact Business. 10 Tips for Staying out of Ethical Trouble in Social Media. Video 19 - Reviewing Simultaneous Search Results before the ...

Techworld: Breaking News for Business Technology & Enterprise IT - Techworld.com.