article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Phishing scams, malware, ransomware and data breaches are just some of the examples of cyberthreats that can devastate business operations and the protection of consumer information. Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942).

article thumbnail

SHARED INTEL: How Russia’s war mongering compromises those holding security clearances

The Last Watchdog

The conflict in Ukraine is a prime example of how engaging in global commerce and providing aid to foreign countries or foreign nationals may pose a security risk. The events in Ukraine have the potential to change things for security clearance holders in the United States. in order to persuade them to divulge U.S. national interests.

Security 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technically under government control. As the world watches the events in Ukraine, cyber incursions by hostile actors will continue across the globe.

article thumbnail

The Netherlands declares war on ransomware operations

Security Affairs

The Dutch government will not tolerate ransomware attacks that could threaten national security, it will use intelligence or military services to curb them. The Dutch government announced that it will not tolerate cyberattacks that pose a risk to its national security and will employ intelligence or military services to counter them.

article thumbnail

DHS announces its ‘Hack DHS’ bug bounty program

Security Affairs

“As the federal government’s cybersecurity quarterback, DHS must lead by example and constantly seek to strengthen the security of our own systems,” said Secretary Alejandro N. This program is one example of how the Department is partnering with the community to help protect our Nation’s cybersecurity.” . Mayorkas. “The

IT 109
article thumbnail

Protecting the Crown Jewels: The evolution of security strategies and asset protection

Thales Cloud Protection & Licensing

These men and women are obviously highly trained in security matters, as it’s reported that they need to have 22 years of military service to even. Does this historical reference to keys have a connection to modern day security for the Queen during events such as the upcoming Platinum Jubilee in June 2022?

article thumbnail

Cyber recovery vs. disaster recovery: What’s the difference? 

IBM Big Data Hub

While different—mainly due to the causes of the events they help mitigate—cyber recovery and DR are often complementary, with many enterprises wisely choosing to deploy both. Many small- and medium-sized businesses don’t have the resources to recover from a disruptive event that causes damage on that scale.