Every year at this time we anxiously await Symantec's Internet Security Threat Report, hoping that this would be the year that all cybercrooks would disappear. But, as usual, our hopes have been stomped upon by the facts.
More than ever before, journalists who work in dangerous zones understand the importance of technology to improve safety and reduce risk. Orellana, an investigative reporter for La Prensa, Honduras, works in San Pedro Sula, which has the highest murder rate in the world, with 186 murders per 100,000 people. Unwilling to investigate stories with only phone interviews, she enters the turf of drug cartels to interview victims of violence.
The rest of the world pays a heavy price for Pakistan's negligence or incompetence when, for example, Islamabad says it did not know that the world's most wanted terrorist, Osama bin Laden, was hiding in Abbottabad in the backyard of the Pakistan Military Academy, or that a global network of fraudulent degrees such as Axact existed and openly operated from Pakistan.
Hope and fear are close cousins. Great leaders balance the two and approach them in a measured way with resolve. Great technology leaders show how innovation can feed into--and balance--the two.
I surrendered to the U.S. Marshals Service after a week of constructively avoiding the FBI while I negotiated (through my attorney mostly, though at times in joint conference calls) with the U.S. Attorney's Office for the Southern District of New York.
Many Western observers fear that cyber reform based on the principle of internet sovereignty might legitimize authoritarian control and undermine the cosmopolitan promise of the multistakeholder system. China, however, benefits too much from the current system to pose a credible alternative.
CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.
It's also important to have a solid understanding of the benefits and hindrances of both centralized and decentralized program models before selecting the right one for your organization.
While it is disconcerting that there isn't a more robust incident response culture out there, perhaps more worrisome is the seeming lack of best practices pointed at heading off the problem before it happens. That's where a new term comes into play.
Digital parents are active partners in their child's digital life and must set an example for smart Internet use. Apart from teaching computer skills to children, the digital parent is best suited to guide the child on issues of online safety, and digital citizenship.
Quantum computers are already here in a limited form, and fully functional versions are on the way. They will be as transformative for mankind as were the mainframe computers, personal computers, and smartphones that we all use. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.
Embarrassing emails from Sony executives and Hollywood celebrities got the headlines and the jeering tweets, but the hack, reportedly coming from North Korea, was a devastating cyber-takedown of the $20 billion company.
Just because it's hard to understand how cloud computing works, many managers feel paranoid about cloud safety. Ease their minds by debunking three of the most pervasive cloud security myths.
Individuals, Companies, Governments and Brands need to pay careful attention to the correlation between search, social media and reputation control and management. If it is left to the Internet, you will not be happy with the results.
In the past few years more than 80 innovative startup companies as of April 2015 have been valued at more than $1 billion. With the most innovative and those with the most potential reaching well beyond this mark.
As someone interested in joining the IT workforce, or someone who is already involved with IT but looking to further their career, cybersecurity - as a specialization - offers a number of benefits and advantages. If you've never considered training in IT security, now is the time to reconsider.