Remove Government Remove Manufacturing Remove Strategy
article thumbnail

US Cybersecurity Strategy Shifts Liability Issues to Vendors

Data Breach Today

Holding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency Questions A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S.

article thumbnail

AUTHOR Q&A: China’s spy balloons reflect a cyber warfare strategy America must counter

The Last Watchdog

Part one of the book catalogues how cyber criminals and US adversaries have taken full advantage of systemic flaws in how we’ve come to defend business and government networks. LW: Your juxtaposition of China’s approach to cyber strategy vs. the U.S. The US needs to be more aware of China’s broader, surreptitious digital strategy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elections 2024, artificial intelligence could upset world balances

Security Affairs

Governments should recognize electoral processes as critical infrastructure and enact laws to regulate the use of generative Artificial Intelligence. The outcomes of these elections can shape Europe’s political strategy and its relations with China and Russia, making them susceptible to vote manipulation in the listed states.

article thumbnail

Vietnam-linked Bismuth APT leverages coin miners to stay under the radar

Security Affairs

The hackers targeted organizations across multiple industries and have also hit foreign governments, dissidents, and journalists. Since at least 2014, experts at FireEye have observed APT32 targeting foreign corporations with an interest in Vietnam’s manufacturing, consumer products, and hospitality sectors. ” Microsoft said.

Mining 343
article thumbnail

Supercharge Your Data Strategy with the Latest Insights on Data and AI

OpenText Information Management

Whether you’re managing a data warehouse, exploring cloud analytics, or leveraging a data lakehouse, this guide will provide the knowledge you need to elevate your data strategy. Ready to supercharge your data strategy? The post Supercharge Your Data Strategy with the Latest Insights on Data and AI appeared first on OpenText Blogs.

article thumbnail

Ukraine’s intelligence service hacked Russia’s Federal Air Transport Agency, Rosaviatsia

Security Affairs

” Rosaviatsia is the government agency responsible for the oversight and regulation of civil aviation in Russia. The announcement marks the first time that a government admitted to having used hacking as part of its military strategy during a conflict. ” concludes the report.

Military 351
article thumbnail

It is time to re-evaluate Cyber-defence solutions

Security Affairs

Just where is the Global Cyber-defense Market going, and why is it failing so spectacularly to protect the data assets of the largest and most heavily protected government institutions and corporate companies in the world. For more information on this, see: Manchester United Football Club Cyber Attack.

IT 316