You are here |
krebsonsecurity.com | ||
| | | |
www.schneier.com
|
|
| | | | ||
| | | |
www.schneier.com
|
|
| | | | I trusted a lot today. I trusted my phone to wake me on time. I trusted Uber to arrange a taxi for me, and the driver to get me to the airport safely. I trusted thousands of other drivers on the road not to ram my car on the way. At the airport, I trusted ticket agents and maintenance engineers and everyone else who keeps airlines operating. And the pilot of the plane I flew in. And thousands of other people at the airport and on the plane, any of which could have attacked me. And all the people that prepared and served my breakfast, and the entire food supply chain-any of them could have poisoned me. When I landed here, I trusted thousands more people: at the airport, on the road, in this building, in this room. And that was all before 10:30 this morning... | |
| | | |
iclg.com
|
|
| | | | Data Protection Laws and Regulations covering issues in USA of Relevant Legislation and Competent Authorities, Definitions, Territorial Scope, Key Principles | |
| | | |
blog.ericgoldman.org
|
|
| | By guest blogger Jeff Kosseff [Jeff Kosseff is an assistant professor of cybersecurity law at the U.S. Naval Academy. The views in this post are only his, and do not represent the Naval Academy, Department of Navy, or Department of... |