Remove 2012 Remove Cybersecurity Remove Education Remove Military
article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

or MEDC, I’m prepared to rechristen Michigan the Cybersecurity Best Practices State. My reporting trip included meetings with Michigan-based cybersecurity vendors pursuing leading-edge innovations, as well as a tour of a number of thriving public-private cybersecurity incubator and training programs. Getting proactive.

article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. In 2012, the US government added Shevlyakov to Entity List, a ban list for procuring and delivering export-restricted items to Russia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analyzing attacks conducted by North Korea-linked ARCHIPELAGO APT group

Security Affairs

Google’s Threat Analysis Group (TAG) is warning of the North Korea-linked ARCHIPELAGO group that is targeting government and military personnel, think tanks, policy makers, academics, and researchers in South Korea, the US and elsewhere.

article thumbnail

House Passes Two Cybersecurity Bills

Hunton Privacy

On April 26, 2012, the U.S. In addition, the House approved the Federal Information Security Amendments Act of 2012 (H.R. In addition, the House approved the Federal Information Security Amendments Act of 2012 (H.R. House of Representatives approved the Cyber Intelligence Sharing and Protection Act (“CISPA” or H.R.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I paged through weekly reports, presentation slides from status meetings, and general briefings to educate visitors. It’s used to keeping this stuff behind multiple levels of security: gates with alarms, armed guards, safe doors, and military-grade cryptography. They were leaked in 2013, but most of them were from 2012 or before.)