article thumbnail

2022 Cyber Security Review of the Year

IT Governance

You can see more incidents from January in our list of data breaches and cyber attacks. Tensions rose throughout February as the Russian military amassed across the Ukrainian border. Articles 24(1) and 32(1) state that organisations must implement appropriate technical and organisational measures to protect personal data.

Security 132
article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. By contrast China takes a long view, as explicitly outlined in its Made in China 2025 manifesto.

IoT 171