article thumbnail

Vulnerabilities in Weapons Systems

Schneier on Security

” That was Bruce’s response at a conference hosted by U.S. In 2018, a 29-country NATO exercise, Trident Juncture , that included cyberweapons was disrupted by Russian GPS jamming. NATO does try to test cyberweapons outside such exercises, but has limited scope in doing so.

Military 144
article thumbnail

Learn. Transform. Advance.

erwin

That was the theme of the global conference we produced in October, but I’d venture to say it’s the mantra global organizations need to adopt as we continue to deal with the most disruptive event of our lifetime: COVID-19. When I look back, I should not be surprised that 2020 has been incredibly busy for us here at erwin. Be thankful.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

Enforcement Uber fined €10 million for GDPR breaches The Dutch data protection authority, Autoriteit Persoonsgegevens, has fined Uber €10 million for failing to be transparent about its data retention practices and making it difficult for drivers to exercise their data privacy rights.

article thumbnail

EU: Competition policy in the digital era (Part 1)

DLA Piper Privacy Matters

The benefits are enormous, as digital communication facilitates exchanges and searches, and enhances consumer choices not only in purchasing consumer goods, but also in finance, healthcare, and producing industries from manufacture to agriculture. 13-14), not unlike traditional newspapers, which were known to be left or right.

article thumbnail

Join Our Webinar on November 16th: IGI & Preservica Address the Governance of Long-Term Digital Information

IGI

Since joining the Preservica team, I have had many opportunities to learn from our customers, industry analysts, and a range of practitioners who shared their stories at this year’s conferences.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. And we’ll hear about the ICS Village, not just at DEF CON but RSAC and other conferences. Welcome to The Hacker Mind, an original podcast from ForAllSecure. Van Norman: Right right.

article thumbnail

Discovery of New Internet of Things (IoT) Based Malware Could Put a New Spin on DDoS Attacks

Data Protection Report

Vulnerable devices include various routers made by leading manufacturers, such as D-Link, Netgear, and Linksys, in addition to the types IoT devices used by Mirai. Balancing Remediation and Investigation Objectives. Unfortunately, remediating an attack and restoring operations may adversely impact evidence needed to investigate an incident.

IoT 40