Afghanistan, and cyberspace- a few thoughts…

who is now responsible for the nations information infrastructure?

Is there an obligation to wipe or otherwise protect systems that are readily exploitable?

--

--

--

Mercury Information Security Services are a leading provider of information security services, advice and consulting.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

A Cybersecurity Checklist for the Modern Small Business

1 Week of Cowrie Honeypot Results

How to Protect Your APIs Against These 6 Security Threats

Zero Dependencies

Export Private key from MyEtherWallet

If it seems fishy, it might be a phishing attack — ATTACK Simulator

What is informed consent in Digital Health for Personalised Medicine?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mercury ISS

Mercury ISS

Mercury Information Security Services are a leading provider of information security services, advice and consulting.

More from Medium

What is a SIEM and why do I need one?

The University That Was Hit By A Cybersecurity Attack (and The 6 Cybersecurity Vulnerabilities You…

Ransomware: Guidelines for Best Practices

IoT Device provisioning and considerations