Remove 2016 Remove Manufacturing Remove Military Remove Passwords
article thumbnail

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

Touhill “Adversaries should remember that our military doctrine identifies cyber as one of our combined arms capabilities,” says Greg Touhill, president of AppGate Federal Group , a Florida-based supplier of software perimeter security systems.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. Users were encouraged to change their passwords. A member of the public found the memory stick, viewed its contents (it wasn’t password protected either), and then passed it to the Sunday Mirror.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

The Last Watchdog

I have a Yahoo email account, I’ve shopped at Home Depot and Target , my father was in the military and had a security clearance, which included a dossier on his family, archived at the U.S. A single neglected server that was not protected by a dual password scheme was the last line of defense standing between the hacker and the exposed data.

article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

We disassociated cyber risk, like using weak passwords and visiting sketchy websites, from the harm of that risk. Moreover, the private sector, including utilities, hospitals, manufacturing and IT, etc., In the 21st century cyber defense must be understood as an element of national defense and not just in terms of the military.

Risk 199