Remove Examples Remove Manufacturing Remove Military Remove Personal data
article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

2 Specifically, the interim final rule would be amended to include transactions that involve “software, software program[s], or a group of software programs, that [are] designed to be used on an end-point computing device and include[] as an integral functionality, the ability to collect, process, or transmit data via the internet.”

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

You can see more incidents from January in our list of data breaches and cyber attacks. Tensions rose throughout February as the Russian military amassed across the Ukrainian border. You can see more incidents from February in our list of data breaches and cyber attacks. Other attacks had more broadly political motives.

Security 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

The Last Watchdog

I have a Yahoo email account, I’ve shopped at Home Depot and Target , my father was in the military and had a security clearance, which included a dossier on his family, archived at the U.S. Office of Personnel Management , I’ve had insurance coverage from Premera Blue Cross and I’ve stayed at the Marriott Marquis in San Francisco.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171