article thumbnail

Operationalizing responsible AI principles for defense

IBM Big Data Hub

Recognizing this, the Department of Defense (DoD) launched the Joint Artificial Intelligence Center (JAIC) in 2019, the predecessor to the Chief Digital and Artificial Intelligence Office (CDAO), to develop AI solutions that build competitive military advantage, conditions for human-centric AI adoption, and the agility of DoD operations.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

Related: DHS embarks on 60-day cybersecurity sprints. In response, President Biden last week issued an executive order requiring more rigorous cybersecurity practices for federal agencies and contractors that develop software for the federal government. More paper (regulation) is not going to solve this problem.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors. Adopting the NIST Cybersecurity Framework.

article thumbnail

Information Disaster Plan

The Texas Record

Also research the impact of the information’s proximity to potential man-made hazards, for example the airport, military bases, plants or factories that handle hazardous or flammable material. For e.g. Information on paper is secure based on papers longevity. Paper records lasts hundreds of years, if not thousands.

Paper 98
article thumbnail

Security Affairs newsletter Round 216 – News of the week

Security Affairs

Paper Copy. If you appreciate my effort in spreading cybersecurity awareness, please vote for Security Affairs in the section “Your Vote for the Best EU Security Tweeter” [link]. Russian military plans to replace Windows with Astra Linux. A new round of the weekly SecurityAffairs newsletter arrived! Kindle Edition.

article thumbnail

DHS report – Voting systems in North Carolina county in 2016 were not hacked

Security Affairs

“After voter check-in software failed, federal authorities conducted a forensic analysis of the county’s electronic poll books to see if Russian military hackers who targeted the software provider may have tampered with registration information to disrupt voting.” ” reported the AP agency.

article thumbnail

Propaganda and the Weakening of Trust in Government

Schneier on Security

On November 4, 2016, the hacker "Guccifer 2.0,: a front for Russia's military intelligence service, claimed in a blogpost that the Democrats were likely to use vulnerabilities to hack the presidential elections. Cybersecurity experts would say that posts like Guccifer 2.0's Cybersecurity today is not only about computer systems.