Videos
- Home
- Videos
Protection of Common Types of Department of Defense Controlled Unclassified Information
Most information produced for the government is protected as controlled unclassified information or CUI. You can find multiple training presentations at this web link. There you will also find guides on how to mark CUI. And be sure to recognize that it is the full implementation of NIST SP 800-171 which the DoD defines as adequate security for protection of CUI. When it comes to marking CUI, there are two types: basic and specified. The difference between the two has to do with the law. At this site, you will find a handbook and the handbook will guide you on marking the two types of CUI.c
For weeks, a cyberattack paralyzed the German district of Anhalt-Bitterfeld in 2021, bringing its whole administration to a standstill. It was a stark illustration of how hackers can knock out entire communities in milliseconds — and how digital technology has become vital for running our societies.
A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley company, talks about why he turned his back on black hat hacking for the greater good.
The number of businesses falling victim to ransomware attacks each year is snowballing. That’s because hackers have realised how lucrative these attacks are, with ransoms in the millions regularly being paid out.
Every seven minutes a cyber-attack is reported in Australia. Millions of Australians have had their data stolen in malicious attacks, costing some businesses tens of millions of dollars in ransom. The federal government is warning the country must brace for even more strikes as cyber gangs become more sophisticated and ruthless.
The Dark Web – There’s a dark side to the internet, and you probably don’t even know it exists. Look behind the positive veneer of social media, communication apps and platforms that have made our lives easier and more connected, and you’ll find criminals using the same apps and platforms to run illicit and dangerous activities.
Singapore aims to be a “Smart Nation” but the more it depends on I.T., the more it opens itself to cyber threats. This is the cybersecurity dilemma. Explore global incidents of cyber espionage, disinformation, disruption and pandemics and how they endanger nations.
A shadow war is a war that, officially, does not exist. As mercenaries, hackers and drones take over the role armies once played, shadow wars are on the rise. States are evading their responsibilities and driving the privatization of violence. War in the grey-zone is a booming business: Mercenaries and digital weaponry regularly carry out attacks, while those giving orders remain in the shadows.
