Remove Course Remove Information Security Remove Manufacturing Remove Military
article thumbnail

MICROCHIPS Act aims at improving tech supply chain

Security Affairs

Two US senators have introduced legislation a bill, dubbed Manufacturing, Investment and Controls Review for Computer Hardware, Intellectual Property and Supply ACT (MICROCHIPS Act – S. military information.” MICROCHIPS Act ( S. that could potentially harm and expose both consumer and U.S. ” senators said.

article thumbnail

China: Navigating China episode 18: Increased scrutiny over connected car and automobile industry data from Chinese regulators, including push towards data localisation

DLA Piper Privacy Matters

The Draft Provisions apply across the industry, not just to vehicle designers and manufacturers, but also parts and software providers, dealers, maintenance and repair agencies, online car hailing organisations and insurance companies. other data that may affect national security and public interests. outside of the vehicle; and.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. ” So it’s not surprising that this recording coincided with another major security event. “Hi, Rob.”

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. ” So it’s not surprising that this recording coincided with another major security event. “Hi, Rob.”

IT 52
article thumbnail

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Both were well-equipped to teach, test and train individuals ranging from teen-agers and non-technical adults, to working system administrators and even seasoned tech security pros. Guiding youth is vital, of course. Veterans have an inclination to continually defend their country, and many have security clearances, he says.

article thumbnail

GUEST POST: How China’s updated digital plans impacts U.S. security and diplomacy

The Last Watchdog

In President Xi’s April 2020 speech to the Party’s Central Economic and Financial Working Group, he called for building “independent, controllable, secure, and reliable supply chains to ensure industrial and national security…”. Deepening that global dependence occurs through partnerships. Both have displayed a shift away from the U.S.

Security 201