article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: "After all, we are not talking about protecting the nation's nuclear launch codes. The thing is, that distinction between military and consumer products largely doesn't exist.

Military 100
article thumbnail

North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South Korea

Security Affairs

Cyber attacks conducted by the APT37 group mainly targeted government, defense, military, and media organizations in South Korea. Dolphin abuses Google Drive cloud storage for Command & Control communication. Kaspersky first documented the operations of the group in 2016. ” reads the post published by ESET.

Military 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked threat actors breached US cleared defense contractors (CDCs)

Security Affairs

Department of Defense (DoD) and Intelligence Community in multiple areas: Command, control, communications, and combat systems; Intelligence, surveillance, reconnaissance, and targeting; Weapons and missile development; Vehicle and aircraft design; and Software development, data analytics, computers, and logistics. Air Force, U.S.

article thumbnail

Cyber recovery vs. disaster recovery: What’s the difference? 

IBM Big Data Hub

Disaster recovery can refer to everything from equipment failures, power outages, cyberattacks, civil emergencies, natural disasters and criminal or military attacks, but it is most commonly used to describe events with non-malicious causes. What is cyber recovery? million—a 15% increase over the last 3 years.

article thumbnail

2020 Predictions – Quantum knows what you did last summer

Thales Cloud Protection & Licensing

This scientific initiative together with those of the recent past, such as the terrestrial quantum-communication link between Beijing and Shanghai and the Micius satellite, could secure China’s government communications against foreign observation – at least until post-quantum cryptanalysis becomes a functional reality.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

CISOs’ fundamental challenge Continual clear communication is needed to cut through the noise and confusion of digital transformation. Enterprises are in the throes of migrating their legacy on-premises IT infrastructure into the cloud. If you look at the military model, the military is constantly training.

Security 261
article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

His approach uses the philosophy that is used in the military, whereby an untrained individual is placed into positions based on aptitude. At Thales, for example, we seek people with broad technology, as well as communication skills as part of the hiring criteria. On this point, I agree with Thom.