Today’s Risk Manager

 
 
  • Cyber “Advanced Persistent Threats” Lurk Before Striking

    Some of the most insidious and sophisticated cyber attacks against organizations take the form of “Advanced Persistent Threats.” The key to how APTs work is stealth. An initial breach may employ conventional hacking strategies, like phishing or...

    • Posted 3 days ago
    • 0
  • AI Masters Poker. Is Cybersecurity Next?

    An artificial intelligence program developed by researchers at Carnegie Mellon and a Facebook AI Lab has more than held its own against some of the best poker players in the world. Moreover, it did so without recourse...

    • Posted 4 days ago
    • 0
  • “Deep Fakes” Are A Free Speech Conundrum

    By today’s standards the job that was done on Nancy Pelosi is relatively primitive. Recently, for example, to prove a point the filmmaker Jordan Peele (BlacKkKlansman and Get Out) collaborated with Buzz Feed and produced a video...

    • Posted 1 week ago
    • 0
  • Transgender Protections In The Workplace

    The Supreme Court has accepted three cases related to employment protections for LGBTQ individuals, but decisions are not expected until 2020. There is no way to know what the Court will do and whether protections under Title...

    • Posted 1 week ago
    • 0
  • Site That Streams Sanitized Versions of Movies, Hit With $62M Damages, Vows To Fight On

    The movie streaming service VidAngel, ordered to pay $62.4 Million in damages for copyright infringement, said it would appeal the verdict as well as explore its options in bankruptcy court.

    • Posted 2 weeks ago
    • 0
  • GDPR One Year Later

    This year in May marked one year since the implementation of the EU’s General Data Protection Regulation. There had been a brief informal grace period, but that has expired and enforcement has begun. In this Today’s General...

    • Posted 2 weeks ago
    • 0
  • Is Censoring Terrorists On The Internet Counterproductive?

    Monitoring and taking down terrorist internet content is generally viewed as sound defensible policy, with the main problems being the sheer quantity of material and the difficulty of establishing an operative definition of what needs to be...

    • Posted 3 weeks ago
    • 0
  • A Powerful Hacker Tactic: “Island-Hopping”

    The term derives from military history of World War II. Instead of a frontal attack on a big target, the strategy is to slowly take small islands off the coast, building “strength and stealth.” It was the...

    • Posted 3 weeks ago
    • 0
  • Las Vegas Massacre Spawns Coverage Dispute

    MGM Resorts International is suing Illinois-based Zurich American Insurance Co. in a dispute related to the 2017 shooting that left 58 people dead. MGM Resorts owns the Mandalay Bay hotel, where a man took up a position...

    • Posted 3 weeks ago
    • 0
  • Is “The Constitutional Question of the Twenty-First Century” Now Before The Ninth Circuit?

    According to one of the attorneys in the so-called climate kids’ lawsuit the answer is yes, and New Yorker writer Carolyn Kormann appears to be sympathetic. She concludes her article about the case with an excerpt from...

    • Posted 3 weeks ago
    • 0
Do NOT follow this link or you will be banned from the site!