Remove Case Study Remove Compliance Remove Data Remove Military
article thumbnail

SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity

The Last Watchdog

Here’s the exchange, edited for clarity and length: LW: Should we be more concerned about cyber exposures than classic military threats? Romanoff: Classic military threats will always merit significant concern due to their direct impact on life. Similar bills, including many data privacy bills, follow California’s lead.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

They have IT contractors who can provision laptops and maintain a certain level of compliance and security. If you're familiar with that entire concept of not only am I going to threaten you from a ransomware perspective, but I'm going to exfil all your data in the first place. Double extortion is going to continue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 461 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Private Plane Owners’ Data Linked to LA Intl. Private Plane Owners’ Data Linked to LA Intl. Private Plane Owners’ Data Linked to LA Intl. Private Plane Owners’ Data Linked to LA Intl.

Security 104
article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

They exfiltrated at least 100GB of data and Colonial was down for almost a week. The stricter compliance rules have only been around those doing business with the U.S. There is no specific proposed increase in compliance for Critical Infrastructure that I am aware of, nor is that necessarily the answer. government.