article thumbnail

Spotlight Podcast: RADICL Is Coming To The Rescue Of Defense SMBs

The Security Ledger

and other militaries have always been at the top of the target list for so-called “advanced persistent threat” cyber adversaries. Air Force personnel way back in 2005 as a way to talk about the kinds of enduring cyber attacks and attempts at data exfiltration they were observing.

article thumbnail

Special Media Catalog Updates

Unwritten Record

1945 (NAID 5768, Local Identifier 18-SFP) (313 new item descriptions with scanned catalog cards; 11 video files). 1936 (NAID 24608, Local Identifier 111-H) (video files and scanned production files added to 450 existing item descriptions). 1965 (NAID 607018, Local Identifier 306-IN) (350 new item descriptions with 273 video files).

article thumbnail

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

The Last Watchdog

and Israel, 2005 – 2010,) Operation Aurora (China, 2009,) the Sony Pictures hack (North Korea, 2015,) and WannaCry (North Korea, 2017.) . -• MOVEit hack (2023) File sharing hook-ups for thousands of enterprises get compromised, triggering class action lawsuits. It’s not just Russia.