article thumbnail

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

Dyatlov’s judgment is supported by a 2002 report for the National Academy of Sciences of Belarus , which investigated the reactor design and how it led to the disaster. There were at least two other cybersecurity incidents at U.S. The regulations, in part, stem from education about Chernobyl.

article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing voting machines means raising funds

The Parallax

When the Senate failed to move the Secure Elections Act forward in August because of White House concerns over states’ rights , coupled with funding concerns, the United States lost its best chance this year of taking steps toward patching voting machines. The cybersecurity threat was more than science fiction at that point,” she says.

article thumbnail

Open source the secret sauce in secure, affordable voting tech

The Parallax

SAN FRANCISCO—The fastest, most cost-effective way to secure direct-record electronic voting machines in the United States, according to cybersecurity experts, is to stop using them. Experts disagree on how to secure absentee votes. Context Conversations preview: Election security. Why current funding to secure U.S.

article thumbnail

Cybersecurity 2030

Haft of the Spear

Discussions about cybersecurity overwhelmingly focus on the recent, which are our responses to the design and engineering decisions of the past. Yet in cybersecurity [1] the path towards a brighter future is rarely discussed. We want things to be “better” but what does that mean? Just as important: better for whom?

article thumbnail

How experts plan to secure the 2020 election

The Parallax

But even with a few races still undecided , experts say election officials should be taking steps now to better secure the vote for the next presidential election, in two years. Higher voter turnout certainly didn’t ease election cybersecurity challenges. Open source the secret sauce in secure, affordable voting tech.

article thumbnail

What Is cloud security?

Lacework

At this time, establishing server securing meant focusing on physical measures and preventing unauthorized individuals from accessing the hardware. Amazon released Amazon Web Services (AWS) in 2002, Google launched Google App Engine’s beta version in 2008, Microsoft’s Azure made its debut in 2010, and Google Compute Engine premiered in 2012.

Cloud 98