article thumbnail

When least privilege is the most important thing

CIO

When this no longer became tenable, Microsoft led the way and started its Trustworthy Computing initiative in 2002. Some companies want third-party backup solutions for their cloud services. Backups are done regularly, but data restoration is generally a rare task. Implement compensating controls.

article thumbnail

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

Dyatlov’s judgment is supported by a 2002 report for the National Academy of Sciences of Belarus , which investigated the reactor design and how it led to the disaster. Thanks to a computer backup system, combined with the reactor being offline for unrelated reasons, the Slammer attack didn’t result in any damage.

article thumbnail

Cybersecurity 2030

Haft of the Spear

The Rapid Data Recovery Act of 2028 requires the mandatory implementation of backup schemes by publicly traded companies, government agencies, and critical infrastructure. The most effective countermeasure to ransomware is a sound backup scheme that stores copies off-line where ransomware cannot reach it. FORECAST TWO: SOX REDUX.