article thumbnail

North Korean Hackers Target South Korean Naval Shipyards

Data Breach Today

Nation-State Attacks on Defense Manufacturers Rising Since November 2022 South Korean national intelligence has sounded alarms about North Korean hackers targeting the country's shipbuilding industry to steal naval military secrets.

Military 290
article thumbnail

US Cybersecurity Strategy Shifts Liability Issues to Vendors

Data Breach Today

Holding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency Questions A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The top tech trends in manufacturing for 2021

OpenText Information Management

The pandemic didn’t completely alter our technology strategies. Cloud is the foundation of digital transformation… According to Forbes, manufacturers will … The post The top tech trends in manufacturing for 2021 appeared first on OpenText Blogs. So, what does the year ahead hold?

article thumbnail

Former US CISO on New US Cybersecurity Strategy: 'It's Bold'

Data Breach Today

National Cybersecurity Strategy. His top takeaway: the shift of cybersecurity responsibility from consumers to manufacturers of vulnerable products. Gregory Touhill, the very first U.S. federal CISO back in the Obama administration, says he's encouraged by the new U.S.

article thumbnail

Five Steps to Rethink Manufacturing with Product Design Data Exchange Strategy

Rocket Software

Manufacturing is a complex, evolving industry, and disruptions in the past year and a half have complicated these operations even further. According to KPMG’s Global Manufacturing Outlook Report , the greatest threat to manufacturers’ growth over the next three years is the risk to the supply chain.

article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

A security strategy should clear obstacles and enable every part of a business operation to run smoothly. Departments such as support, manufacturing, design, services, and delivery are enhanced by smart security measures, which allay distracting setbacks and increase the overall inertia. What constitutes “smarter security?”

Risk 214
article thumbnail

UK: New National Strategy for Health Data

DLA Piper Privacy Matters

The UK’s Department for Health and Social Care (“ DHSC ”) has published a major strategy document (‘ Data saves lives: reshaping health and social care with data ’) outlining the government’s plans for the regulation and use of data in healthcare. Fair Terms for Data Partnerships. Trust and Transparency. Improving Access to Health Data.