Remove 2018 Remove Exercises Remove Military Remove Security
article thumbnail

Weekly podcast: TSB, hotel locks and NATO exercise

IT Governance

This week, we discuss TSB’s chaotic system upgrade, a security flaw in electronic hotel locks and a major NATO cyber security exercise. Hello and welcome to the IT Governance podcast for Friday, 27 April 2018. F-Secure has worked with Assa Abloy for a year to implement software fixes.

article thumbnail

How to Ensure Your Digital Security During the Rugby World Cup

Thales Cloud Protection & Licensing

At the 2018 Winter Olympic Games held in PyeongChang, for instance, cyber criminals leveraged a previously unknown family of malware called Olympic Destroyer to attack the Games’ servers just before the opening ceremony. Regarding the 2019 Rugby World Cup, they should also follow a few additional security best practices.

Security 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

I was recently privileged to be part of a group of journalists covering the 2018 North American International Cyber Summit at Detroit’s Cobo Convention Center. Other hubs followed at military bases, other state universities and even a high school and a non-profit community arts and tech center. Cobo Center. Getting proactive.

article thumbnail

MY TAKE: Here’s how diversity can strengthen cybersecurity — at many levels

The Last Watchdog

Today, Skelly is Vice President of Global Partnerships and Security Evangelist at Circadence® , a distinctive security vendor, in its own right. military carry out training exercises for real life cyber warfare. The concern is that this could constrain the development of broadly effective security-focused AI.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. Hello and welcome to the final IT Governance podcast of 2018. The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD.

article thumbnail

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

The news is curious and it probably has little real if not the fact that Vladimir Putin is not a super cyber security expert, although he knows its importance very well. Nowadays it is a suicide to use a computer running Windows XP because the OS doesn’t receive security updates and it is quite easy to find working exploits online.

article thumbnail

Vulnerabilities in Weapons Systems

Schneier on Security

Our military systems are vulnerable. We need to face that reality by halting the purchase of insecure weapons and support systems and by incorporating the realities of offensive cyberattacks into our military planning. Over the past decade, militaries have established cyber commands and developed cyberwar doctrine.

Military 145