article thumbnail

US will help Baltic states to secure baltic energy grid

Security Affairs

The three countries will be integrated into the European energy grid by 2025, without depending on the Russian grid. Suspected Russia-backed hackers have launched exploratory cyber attacks against the energy networks of the Baltic states, sources said, raising security concerns inside the West’s main military alliance, NATO.”

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Tensions rose throughout February as the Russian military amassed across the Ukrainian border. Although Vladimir Putin and his sympathisers assured the world that they were simply conducting military exercises, the inevitable occurred on 24 February, when troops mobilised and war was declared. trillion (about £8.9

Security 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST POST: How China’s updated digital plans impacts U.S. security and diplomacy

The Last Watchdog

As articulated in previous blog posts, both the BRI and DSR initiatives have been strategically positioned to facilitate secure trade and gain initial global footholds to accomplish the “Made in China 2025” goal. This essay was originally published on ISA’s Daily Cybersecurity Blog. Both have displayed a shift away from the U.S.

Security 201
article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

As a cybersecurity principal analyst at Forrester, he advises enterprise clients on how to stay in front of the latest iterations of cyber attacks coming at them from all quarters. LW: How do you explain the fact that companies spend more than ever of cybersecurity, yet continue to get catastrophically breached?

Passwords 149
article thumbnail

New Cyberthreats for 2021

Adam Levin

The threat landscape of cybersecurity changes daily, with hackers and cybersecurity professionals in a perpetual cat-and-mouse chase; hackers discover new ways to infiltrate and exploit their targets, and the cybersecurity industry looks for vulnerabilities, tries to anticipate new threats and responds when cyber security issues arise.

IoT 52
article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. By contrast China takes a long view, as explicitly outlined in its Made in China 2025 manifesto.

IoT 171