I hate to waste time. Ideally, my time should be spent with family, friends, pursuing investments, exercising, reading, sleeping, on the computer, or on a host of other things that are productive, including helping others.
One thing that is growing in need and in reality is the international and cross-cultural aspects of cybersecurity. For example, businesses and governments alike in the US and in Israel face similar challenges within similar robust telecom and economic environments.
The important point is that no cloud strategy is complete without rock-solid security execution. Organizations may be moving quickly to the cloud but skimping on security as they do so can be a terrible and costly mistake.
Today's IT infrastructures in banks have grown historically over decades. Creating a helicopter view of the IT landscape is sometimes impossible because it takes a large group of experts from different areas in a bank to talk to each other in order to get an overview.
Yesterday, Ben Carson announced his new cybersecurity plan. It's relatively short and concise, but if you don't find yourself with the time to wade through the full report, his basic overarching recommendation is a proposal "based on one simple principle: unifying America's response to cyber threats."
The holiday decorations had barely been returned to the attic when 2016 already saw its first high-profile cyber attack. Time Warner Cable said on Jan...
What is the most valuable thing to a hacker? Most people would probably assume it's a credit card number. But actually, stolen credit card numbers pa...
Forget about the NSA. When it comes to tracking your personal information and habits, the refrigerator in your kitchen may soon do a better job than ...
By their evolving nature today, cyber threats cannot be addressed in isolation. Increasingly, your cyber risk becomes my risk if we are virtually connected, and a system's aggregated risk becomes the risk of all component users and contributors.
For most entrepreneurs, the Internet and technology allows them to solve problems they come across. However, for some entrepreneurs like Marcin Kleczynski, the Internet and technology becomes the source of the problem one decides to take on.
If you want to do what you can to help protect your business, it pays to stay up to date on the best ways to go about it.
This story is just a real world reminder of how, thanks to the huge benefits of reusing code, almost none of the software we use exists in a vacuum, and so a bug in a silly video game can actually lead to a serious exploit in a sensitive government system.
I encourage the Chinese leadership to consider whether the imbalance between maintaining domestic stability and stifling free speech and limiting free access to information will eventually impair Chinese citizens, as well as China's true national potential.
2015 brought with it a heightened global focus on cybersecurity, with record-breaking data breaches and concern around national security increasingly ...
If you're protecting important personal accounts with nothing more than a few security questions, it may be time for an upgrade.
The bill, pushed by the U.S. Chamber of Commerce and corporations including Koch Industries and Honeywell International, would force the online disclosure of sensitive personal information of sick and dying asbestos victims seeking compensation for their illnesses.