article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Businesses across all industries can function adequately without worrying about would-be hackers with malicious intent when they secure their networks. Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942). As a result, the U.S.

article thumbnail

RSAC Fireside Chat: Dispersive adapts WWII radio-signal masking tool to obfuscating network traffic

The Last Watchdog

military scattered radio-signals and added noise to radio transmissions — to prevent the jamming of torpedo controls. Decades later, the telecom industry figured out how to spread WiFi, GPS, BlueTooth and 5G signals over a wide bandwidth and then also added pseudo-random codes — to prevent tampering.

Military 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: OT Is Under Attack. Now What?

The Security Ledger

Chris and I talk about how industry is responding – including the growing role of government, ISACs and managed security services providers (MSSPs) in helping shore up the security of critical infrastructure. critical infrastructure in the event of a major crisis or conflict” with the U.S.

article thumbnail

White hat hackers showed how to take over a European Space Agency satellite

Security Affairs

This week, during the third edition of CYSAT, the European event dedicated to cybersecurity for the space industry, the European Space Agency (ESA) set up a satellite test bench, inviting white hat hackers to attempt seizing control of OPS-SAT , a nanosatellite operated by the agency for demonstration purposes.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

Other hubs followed at military bases, other state universities and even a high school and a non-profit community arts and tech center. The early Cyber Range hubs were mainly used to help educate and certify military technicians and cybersecurity professionals at selected companies. They answered, yes. Shoring up weak links.

article thumbnail

Cyber recovery vs. disaster recovery: What’s the difference? 

IBM Big Data Hub

While different—mainly due to the causes of the events they help mitigate—cyber recovery and DR are often complementary, with many enterprises wisely choosing to deploy both. Many small- and medium-sized businesses don’t have the resources to recover from a disruptive event that causes damage on that scale.

article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

These efforts may integrate diplomatic, information, military (both kinetic and cyber), financial, intelligence, and law enforcement capabilities.” ” Another key element of the plan is for the government to act as a backstop for the insurance market in event of “catastrophic events.”