Remove Definition Remove Examples Remove Military Remove Security
article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

The US Government Accounting Office just published a new report: " Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities " (summary here ). From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities.

article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

The term “ dual-use ” refers to technology that can be used for both peaceful and military aims. The current update was urged by technological developments and growing security risks. The post EU bodies agree on new EU export rules for dual-use technology appeared first on Security Affairs. Pierluigi Paganini.

Sales 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

A report from the security firm Team Cymru found the DDoS attack infrastructure used in NoName campaigns is assigned to two interlinked hosting providers: MIRhosting and Stark Industries. That conflict was thought to be the first war ever fought in which a notable cyberattack and an actual military engagement happened simultaneously.

Cloud 274
article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

national security. First, the Proposed Rule would add “connected software applications” to the definition of ICTS. The definition is broad and could encompass a wide range of software — from virtual private network services (VPNs) to mobile applications and computer games.

article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

The Cyber Security Law (2017) (the CSL ) prohibits operators of critical information infrastructures ( CIIs ) from transferring their “important data” and personal information outside of China. The CSL does not provide a definition for “important data”. Network Data Security Regulation. The CSL and the DSL.

article thumbnail

Nine States Pass New And Expanded Data Breach Notification Laws

Data Protection Report

In the absence of federal action, states have been actively passing new and expanded requirements for privacy and cybersecurity (see some examples here and here ). Maryland ( HB 1154 ) – Maryland imposes new requirements on entities following a security breach. Below is a roundup of recent and significant changes. New Jersey ( S.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. It definitely had an effect on me. I tried to talk to Greenwald about his own operational security. I started doubting my own security procedures. Definitely. It made sense. It wasn’t there.