article thumbnail

GUEST ESSAY: Taking proactive steps to heal the planet — by reducing the impact of video streaming

The Last Watchdog

As a result, industry executives are re-evaluating how to balance sustainability with the ever-growing corporate and consumer demand for video content. This should include everything from the extraction of raw materials, design, manufacturing, transportation, and even the final recycling of the devices.

article thumbnail

Vulnerabilities in Weapons Systems

Schneier on Security

Our military systems are vulnerable. We need to face that reality by halting the purchase of insecure weapons and support systems and by incorporating the realities of offensive cyberattacks into our military planning. Over the past decade, militaries have established cyber commands and developed cyberwar doctrine.

Military 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 249: Intel Federal CTO Steve Orrin on the CHIPS Act and Supply Chain Security

The Security Ledger

Steve talks about his work representing Intel and its technologies to the Federal Government and the impact of the recent passage of the CHIPS Act, a huge federal investment in promoting domestic manufacturing of semiconductors. It’s a boon for companies like Intel, the United States most recognized semiconductor manufacturer.

article thumbnail

China-linked APT Volt Typhoon remained undetected for years in US infrastructure

Security Affairs

In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. The Volt Typhoon group has been active since at least mid-2021 it carried out cyber operations against critical infrastructure.

article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. So it’s easy to use for anybody; you don’t have to know how to do encryption. Park: Exactly. LW: Makes sense.

article thumbnail

BIS Issues Long-Awaited Notice on Controls on Foundational Technologies, Adds New Entities to Entity List

Data Matters

With this ANPRM, BIS solicits public feedback on how to identify foundational technologies and establish appropriate controls under ECRA. 4) The Foundational Technologies ANPRM signals potential expansion of controls on items currently subject to military end-use and end-user restrictions. embargo, including an arms embargo.

article thumbnail

McAfee Finds Years-Long Attack by Chinese-Linked APT Groups

eSecurity Planet

“The exfiltrated data would have either been part of an intellectual property theft for economic purposes and/or would have provided insights that would be beneficial in case of military interventions. By having such long-term access, one knows how to stay below the radar,” he said. “We Access Through Compromised Web Server.

Military 145