Remove Definition Remove Examples Remove Manufacturing Remove Military
article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

prohibition, mitigation) on any acquisition, importation, transfer, installation, dealing in, or use of ICTS that has been designed, developed, manufactured, or supplied by parties owned by, controlled by, or subject to the jurisdiction or direction of “foreign adversaries.” The risk factors include.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Could we hack into an airplane, for example. So I'd say it's definitely possible. So I definitely think it's possible. For example, the Embraer regional jet actually uses cables for the elevator controls. That work resulted in new SAE standards and lead to ISO 21434, a new standard focused on cybersecurity in automotive.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

That's where even if they're still doing it themselves, they are definitely looking for partners who can help them cover in the areas where, you know, their capability may not be quite as hard and fast as it should be. That's an example of AI. I will give you an example. AI will be used maliciously. China invaded Taiwan.

article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

The chips were alleged to have spied on users of the devices and sent unspecified data back to the Chinese military. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China. But the U.S. based firms.