{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

08/17/2020
linkedin facebook twitter instagram
WorkScoop
The U.S. has come down hard on Huawei -- again. DOD supply chain is filled with Chinese companies. And the takeaways from DHS's biannual cyberattack drill. This is CyberScoop for Monday, August 17.

US squeezing Huawei

The U.S. Department of Commerce announced Monday it was taking several steps to further restrict Huawei’s ability to acquire electronic components developed using U.S. technology. As part of its actions, the department is adding 38 Huawei affiliates around the world to the U.S. government’s economic black list, which will make it difficult for Huawei to obtain semiconductors — even those produced outside of the U.S. — without a U.S. stamp of approval. The U.S. State Department Monday also accused Huawei of not abiding by earlier restrictions issued in May, claiming “Huawei has continuously tried to evade” them. Shannon Vavra has more.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


It's not just Huawei and TikTok

A report from data analytics firm Govini shows that the Department of Defense‘s IT supply chains has dozens of Chinese companies in it. It is unclear how much work, products or services come from these companies and in what way, but it still is a significant risk, according to Govini’s CEO. “The volume alone is important because it just amplifies the risk,” Tara Murphy Dougherty, a former DOD official and CEO of Govini, said in an interview. The report found several dozen Chinese suppliers from the IT, software and telecommunications equipment industries in a sample of more than 1,000 prime defense contractors’ supply chains. Govini’s findings come as the federal government, including the DOD, has been required by law to remove certain Chinese-owned technology firms from its supply chains as of last week. FedScoop's Jackson Barnett has more.


In the eye of the ‘Cyber Storm’

COVID-19 delayed, but didn’t prevent, DHS’s biannual drill from taking place. Some 2,000 participants — including companies from the health care and manufacturing sectors — convened virtually for the biannual Cyber Storm exercise held by the Department of Homeland Security last week. The takeaway? Some companies didn’t have a good grip on the security of third-party IT services they depend on. The hypothetical hacking campaigns participants had to withstand saw key IT infrastructure, from DNS records to software certificates, compromised. Sean Lyngaas has more.


US and Israel play defense on energy cybersecurity

The U.S. and Israel reportedly collaborated on Stuxnet, one of the most potent hacking tools to target an energy facility on record. But they’ve also increasingly invested in capabilities to defend against that kind of digital sabotage. The latest example came Friday, when the countries’ energy departments announced up to $10 million in funding for private-sector and academic projects to bolster the security of industrial control systems. Among the topics the two governments are interested in is securing PLCs, the category of industrial computers that Stuxnet exploited. Read the announcement here.


Tweet Of The Day

Image

Click through for a fantastic example on how to mess with scammers...


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}