Good guys in, bad guys out. This is a principle that has for a long time shaped how companies approach information security. It is anchored on the premise that you can protect your IT environment from malicious actors by simply making the perimeter more resilient, broader, and stronger. However, the underlying notion that you can...
How Is Controlled Unclassified Information Changing? Certainly, it sounds official and has all the makings for a Jason Bourne-style thriller about espionage and government conspiracies. It also could make a good title for the next hit crime series if placed before the name of a racy city. Its history of more mysterious aliases such as...
With every passing day, more data is created and stored worldwide. The volume of data that organizations create and store continues to increase yearly. According to Statista, the total global volume of data will reach 161 zettabytes (161 trillion gigabytes) by 2025. Business decisions are made based on data. Hence, an organization’s ability to collect the...
In 2007, ITT was fined  $100 million for illegally exporting night vision technology. ITT thought that they could work around the imposed restrictions. However, the government didn’t agree with how they interpreted the rules. In April 2018, FLIR Systems was fined $30 million by the State Department for transferring USML data to employees holding dual nationalities. FLIR was also instructed...
Cybersecurity incidences continue impacting consumers and entities worldwide. The impact of a single incident can be profound. Although people often focus on their personally identifiable information (PII) being stolen and the impact this would have on their life, if specific information related to the Department of Defense (DoD) got into the wrong hands, the impact...