article thumbnail

SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity

The Last Watchdog

Here’s the exchange, edited for clarity and length: LW: Should we be more concerned about cyber exposures than classic military threats? Romanoff: Classic military threats will always merit significant concern due to their direct impact on life. Last Watchdog queried Tom Romanoff, BPC’s technology project director about this analysis.

article thumbnail

Security Affairs newsletter Round 461 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Defense Contractors and Private Sector Companies Intelligence and Information Warfare Biden to sign executive order on US port cybersecurity targeting Chinese-manufactured shipping cranes SVR Cyber Actors Adapt Tactics for Initial Cloud Access Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations Unmasking I-Soon | The Leak That (..)

Security 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Disaster Plan

The Texas Record

Also research the impact of the information’s proximity to potential man-made hazards, for example the airport, military bases, plants or factories that handle hazardous or flammable material. Also, assess infrastructure that if faulty would cause lose of information. Outline and implement security measures to protect this information.

Paper 98
article thumbnail

Is the federal government ready for robotic process automation?

CGI

Don’t think of the shambling, clanking humanoid automatons from 1950s sci-fi, or even the sleek bomb-disposal robots used today by the military and police departments. CGI will present a case study of RPA on the second day of the event.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

Colonial pipeline is a really good case study for the whole critical infrastructure industry. I hear a lot of people saying “this is what the military uses for…” and “this is what NASA uses for…” I would really be happy to hear “This is what the government does for cybersecurity – and we should do it too!

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

The Russia Ukraine scenario, although let's not downplay the lies, that it's affecting the strife, it's causing economic damage and everything else but it is, amazingly enough, staying in this one little localized area, and everyone almost has the ability to treat this like it's a case study. What effect does that have?

article thumbnail

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? Venafi: Cambridge Analytica is just an amazing case study of what can happen when machines can actually pull all this information together, and the massive power of that.