article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “The individual added that the software was “dual use” and that accordingly, “sales to Russia are virtually impossible.”

article thumbnail

Driving Conversations Around Careers In Telematics

Information Governance Perspectives

In 2015, he successfully transitioned from a military career as a trial attorney for the JAG Corps to working in telematics in corporate America for State Farm Insurance. In the military, he got his first exposure to telematics when they asked him what he wanted to do after being a prosecutor, and he exclaimed, “convoys!”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 414 by Pierluigi Paganini – International edition

Security Affairs

billion rubles. billion rubles.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Tensions rose throughout February as the Russian military amassed across the Ukrainian border. Although Vladimir Putin and his sympathisers assured the world that they were simply conducting military exercises, the inevitable occurred on 24 February, when troops mobilised and war was declared. Source: Security Affairs.

Security 132
article thumbnail

Court Plays Referee in Search Term Dispute Between Parties: eDiscovery Case Law

eDiscovery Daily

or “hardware” or “software” or “cloud” or “system” or “(law /2 enforcement)” or “military” or “advantage!” or “sale!” or “sale!” /2 device)” or “SPPM” or “flex” or “fleet” or “DVM” or “FirstVu” or “microvu” or “vulink” or “FleetVu” or “trigger” or “(auto /2 activat!)” or “strateg!” or “evidenc!” or “success!” or “fail!”

article thumbnail

House Passes Two Cybersecurity Bills

Hunton Privacy

Another amendment provides that the federal government may not use shared “information that identifies a person” contained in (1) library circulation records, (2) library patron lists, (3) book sales records, (4) book customer lists, (5) firearms sales records, (6) tax return records, (7) educational records, or (8) medical records.

article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

While some product and sales professionals may try to convince you they can eradicate the chance your data will be breached or systems infected with malware, that’s unfortunately too optimistic and short-sighted given today’s threat landscape. Educate employees. Note that I say, “reduce your risk,” not eliminate it.

Passwords 214