article thumbnail

The 2019 Global Assessment Report (GAR)

Emergency Planning

One of the most intransigent problems with the predecessor of the Sendai Framework, Hyogo Framework for Action, 2005-2015, was its resolute reliance on a 'top-down' approach. UNISDR 2005. Hyogo Framework for Action 2005-2015: Building the Resilience of Nations and Communities. Surminski and J-A. Linnerooth-Bayer (eds) 2019.

article thumbnail

Why All CISOs Need to Prioritize Quantum Tech Today

FS-ISAC

Consider the SHA1 (Secure Hash Algorithm 1), whose weaknesses were discovered in 2005. The US Department of defense is investing in quantum sensing because both troop movements and weaponry are dependent on GPS, which is vulnerable to jamming by enemies. It takes a decade to replace cryptographic standards.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Post: “I’ve Upgraded My Credentials. My Facility Is Safe Now, Right?”

Security Industry Association

Most employees will take their credentials home with them when they leave their facility, and once the employees are outside the secured environment, a secure credential is protected from many of the types of attacks vulnerable credentials are prone to.

article thumbnail

Crises On The Rise: 5 Focus Areas For Greater Resilience

everbridge

For instance, the Atlantic hurricane season of 2020 witnessed a record-breaking number of named storms, with a total of 30, surpassing the previous record set in 2005. Several factors contribute to this trend, including climate change, population growth, and increasing vulnerability of infrastructure and communities among others.

article thumbnail

NCDP 20th Anniversary Reflections and Impacts

National Center for Disaster Prepardness

NCDP has a rich history, from the early preparedness efforts for governmental and non-governmental systems to the complexities of population recovery, the power of community engagement, and the risks of human vulnerability. Below are reflections and commentary from members of the NCDP team. Read also about our beginnings of NCDP.

article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book also covers the vulnerability of PLC controllers and SCADA systems to cyber attacks, the attacks that have been conducted to date and how attacks can be executed on various systems. The final chapter looks at the morality of the attack. Parts of the generator were found 80 feet away!

Malware 52
article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book also covers the vulnerability of PLC controllers and SCADA systems to cyber attacks, the attacks that have been conducted to date and how attacks can be executed on various systems. The final chapter looks at the morality of the attack. Parts of the generator were found 80 feet away!

Malware 52