article thumbnail

News alert: MxD roundtable with White House officials highlights cybersecurity workforce needs

The Last Watchdog

Organizations gathered to discuss courses and programs to address the critical cybersecurity workforce needs in the United States. The CyMOT course series is tailored to meet the needs of each learner, including current manufacturing workers looking to upskill and future workers still learning the basics. Chicago, Ill.,

article thumbnail

GUEST ESSAY: A Memorial Day call to upskill more veterans for in-demand cybersecurity roles

The Last Watchdog

Meanwhile, 200,000 well-trained and technically skilled military service members are discharged each year. Yet, there’s still work to be done to make this path more accessible and known among the veteran and transitioning military community. This experience can also be helpful when training cybersecurity talent.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked APT28 targets govt bodies with fake NATO training docs

Security Affairs

Even today, less than half of the known antivirus engines are flagging the infection on VirusTotal , as observed by BleepingComputer: The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

Military 109
article thumbnail

Catches of the Month: Phishing Scams for March 2022

IT Governance

The Ukrainian government and its military were targeted by DDoS (distributed denial-of-service) attacks, while a pro-Ukrainian group attacked the Belarusian railway system with ransomware after discovering that it was being used by Russia to transport tanks and weapons.

Phishing 144
article thumbnail

Apple AirTag Bug Enables ‘Good Samaritan’ Attack

Krebs on Security

military computers in history” was traced back to a USB flash drive left in the parking lot of a U.S. The risk, of course, is that some researchers may decide it’s less of a hassle to sell their exploits to vulnerability brokers, or on the darknet — both of which often pay far more than bug bounty awards. .

Phishing 310
article thumbnail

Examining the US Cyber Budget

Schneier on Security

The Defense Department's cyber operations have nearly 10 times the funding as the relevant Homeland Security defensive operational element, the National Cybersecurity and Communications Integration Center (NCCIC) ($3.7 government budgeted as much on military construction for cyber units as it did for the entirety of Homeland Security ($1.9

Military 102
article thumbnail

Reimagining Democracy

Schneier on Security

Some questions to think about: Representative democracies were built under the assumption that travel and communications were difficult. Limit financial and military power? My perspective, of course, is security. What could democracy look like if it were reinvented today? And much more: What about the justice system?