More military hacks

“Australia Hack Nets Data on U.S. Arms,” The Wall Street Journal, October 13, 2017 A6.  Hacker hacks a defense contractor’s computers and carried off “commercially sensitive data on sophisticated U.S. weapons systems.”  The ease of the hack is mind-boggling.

Is there a common scheme here?  Or otherwise solve this equation for X.

Advertisements

Leave a comment

Filed under Access, Controls, Corporation, Duty, Governance, Government, Information, Interconnections, Internal controls, IT, Oversight, Protect assets, Security, Third parties, Vendors

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s