As AI gains strategic importance, it is essential to shape global rules for its development and use. In promoting the development and uptake of AI, the European Commission has opted for a human-centric approach, meaning that AI applications must comply with fundamental rights. In this context, the rules laid down in the GDPR provide a general framework and contain specific obligations and rights that are particularly relevant for the processing of personal data in AI.
Want to understand the most valuable tech stats and trends? Legendary venture capitalist Mary Meeker has just released the 2019 version of her famous Internet Trends report. This year it covers everything from Internet growth and usage to customer acquisition costs in highly competitive and capitalized sectors. With 334 pages of content, charts, and comments, the report is essential reading for data discovery and legal discovery technologists as they focus on auditing, investigating, and supporting litigation across the lifecycle of digital data.
It is challenging for existing digital evidence recording and storage technologies to outperform blockchain’s robust and secure offering. With this in mind, the Digital Forensics and Incident Response (DFIR) community may benefit greatly as blockchain technology speeds up digital evidence procedures and redefines digital investigation processes.
Brave is an open-source, privacy-centered browser designed to block trackers and malware. It leverages blockchain technology to anonymously track user attention securely and rewards publishers accordingly. And it may change the way you think about online privacy and advertising.
The role of the Chief Information Security Officer (CISO) is becoming the norm in eDiscovery companies as these companies grow their client base and venture into compliance and data breach prevention services. In fact, one industry expert sees the CISO role also being weaponized to support the sales function during client discussions about security.
A new group of Intel vulnerabilities, collectively called Microarchitecture Data Sampling (MDS), were disclosed last week. The vulnerabilities allow attackers to steal data as processes run on most machines using Intel chips. The vulnerabilities affect nearly every Intel processor released in the past decade and may be especially dangerous in multi-user environments like virtualized servers in data centers.
The BSA Framework for Secure Software tackles complex security challenges through an adaptable and outcome-focused approach that is risk-based, cost-effective, and repeatable. The Framework describes baseline security outcomes across the software development process, the software lifecycle management process, and the security capabilities of the software itself.
The work that Thomas Peyrin and his colleague, Gaetan Leurent, have done goes far beyond just proving SHA-1 chosen-prefix collision attacks are theoretically possible. They show that such attacks are now cheap and in the budget of cybercrime and nation-state attackers.
When an acquirer does not protect itself against a data lemon and seek sufficient information about the target’s data privacy and security compliance, the acquirer may be left with a data lemon.
In 2017, global mobile devices and connections grew to 8.6 billion, and it is estimated that global mobile device traffic will reach almost one zettabyte annually by 2022. These mobile-centric data points coupled with the fact that 85% of criminal investigations include some form of digital data highlight the importance for data and legal discovery practitioners to have a working understanding of how the global law enforcement community considers digital data and devices in their investigative efforts.