Feb 15, 2020 | Access Controls, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, Business, Business Email Compromise, China, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Economic Disruption, Employees, Executives, Extortion, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Intricate Data Systems, Legacy Systems, Malware, Managed Services Provider (MSP), Market Value, Nationstates, News, Patching, Phishing, Policies and Procedures, Radio Show, Regulatory Compliance, Security, Security Alerts, Smishing, Social Engineering, Technology, Third - Party, third-world, Updates, Vishing
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...
Nov 16, 2019 | Artificial Intelligence, automation, DOD, Future Workforce, Government, Machine Learning, Military, Politics, Projects, Radio Show, Radio_Show, Research, Robotics, safety, Science, Security, Technology, vehicles, Virtual Reality, Warfare, wearables
Future Defense and Military Tech Warfare is changing which means that the way we fight and the weapons we use will need to change. Much of the technology that we enjoy and use everyday, initially came from technology developed by and for the military and for space...