article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities. For example, not all programs have been tested and tests do not reflect the full range of threats. It is definitely easier, and cheaper, to ignore the problem or pretend it isn't a big deal.

article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

The term “ dual-use ” refers to technology that can be used for both peaceful and military aims. We have set an important example for other democracies to follow,” said Marketa Gregorova, a European Parliament lawmaker who was one of the lead negotiato. Today is a win for global human rights.

Sales 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

First, the Proposed Rule would add “connected software applications” to the definition of ICTS. The definition is broad and could encompass a wide range of software — from virtual private network services (VPNs) to mobile applications and computer games. First, the definition of “connected software applications” may change.

article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

The CSL does not provide a definition for “important data”. other data that may affect the security of national politics, territory, military affairs, economy, culture, society, science and technology, ecology, resources, nuclear facilities, overseas interests, biology, outer space, polar regions, deep sea etc. The CSL and the DSL.

article thumbnail

Nine States Pass New And Expanded Data Breach Notification Laws

Data Protection Report

In the absence of federal action, states have been actively passing new and expanded requirements for privacy and cybersecurity (see some examples here and here ). 52 ) – New Jersey expands the definition of personal information and modifies notification standards. Below is a roundup of recent and significant changes. New Jersey ( S.

article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

In the inaugural episode, The Hacker Mind looks at why the West Point Military Academy, and other organizations within the DoD, is training its young cadets to hack. Or maybe, just maybe back in 2014, West Point and other military service academies, are on to something really important. The military has these massive computer networks.

article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

In the inaugural episode, The Hacker Mind looks at why the West Point Military Academy, and other organizations within the DoD, is training its young cadets to hack. Or maybe, just maybe back in 2014, West Point and other military service academies, are on to something really important. The military has these massive computer networks.