As a cyber security professional balancing the unique needs of the organization with industry best business practices is always a challenge. Tactics, techniques, and procedures are often a reflection of an organization's prevailing mindset.
Email addresses are like opinions--nearly everyone has one. It is the most public piece of personal information you have besides your name. But what you may not know about your email address could hurt you.
These skills need to be fostered in this year's graduates and those that follow in the years to come if they are to successfully take on and conquer the challenges before them and those that will arise.
Individuals, Companies, Governments and Brands need to pay careful attention to the correlation between search, social media and reputation control and management.
Every year at this time we anxiously await Symantec's Internet Security Threat Report, hoping that this would be the year that all cybercrooks would disappear. But, as usual, our hopes have been stomped upon by the facts.
More than ever before, journalists who work in dangerous zones understand the importance of technology to improve safety and reduce risk. Orellana, an investigative reporter for La Prensa, Honduras, works in San Pedro Sula, which has the highest murder rate in the world, with 186 murders per 100,000 people. Unwilling to investigate stories with only phone interviews, she enters the turf of drug cartels to interview victims of violence.
The rest of the world pays a heavy price for Pakistan's negligence or incompetence when, for example, Islamabad says it did not know that the world's most wanted terrorist, Osama bin Laden, was hiding in Abbottabad in the backyard of the Pakistan Military Academy, or that a global network of fraudulent degrees such as Axact existed and openly operated from Pakistan.
Hope and fear are close cousins. Great leaders balance the two and approach them in a measured way with resolve. Great technology leaders show how innovation can feed into--and balance--the two.
I surrendered to the U.S. Marshals Service after a week of constructively avoiding the FBI while I negotiated (through my attorney mostly, though at times in joint conference calls) with the U.S. Attorney's Office for the Southern District of New York.
Many Western observers fear that cyber reform based on the principle of internet sovereignty might legitimize authoritarian control and undermine the cosmopolitan promise of the multistakeholder system. China, however, benefits too much from the current system to pose a credible alternative.
CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.
It's also important to have a solid understanding of the benefits and hindrances of both centralized and decentralized program models before selecting the right one for your organization.
While it is disconcerting that there isn't a more robust incident response culture out there, perhaps more worrisome is the seeming lack of best practices pointed at heading off the problem before it happens. That's where a new term comes into play.
Digital parents are active partners in their child's digital life and must set an example for smart Internet use. Apart from teaching computer skills to children, the digital parent is best suited to guide the child on issues of online safety, and digital citizenship.
Quantum computers are already here in a limited form, and fully functional versions are on the way. They will be as transformative for mankind as were the mainframe computers, personal computers, and smartphones that we all use. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.
Embarrassing emails from Sony executives and Hollywood celebrities got the headlines and the jeering tweets, but the hack, reportedly coming from North Korea, was a devastating cyber-takedown of the $20 billion company.