Like hanging on to clothes that don't fit, most of America's premier companies are starting to do essentially the same thing with data. The reason? They recognize the opportunity cost of not collecting data.
You can sell damn near anything online these days... or at least you can try. According to police, Misty VanHorn of Sallisaw, Okla. tried (unsuccessfully) to sell her kids on Facebook.
No, I don't support hacking -- but I do support victims and I do support justice. "Noah" decided early on that he didn't believe the teen victim of a rape in Steubenville, Ohio was going to get justice.
If only the actual drone program, and the strategic thinking that underlies it, were to undergo the same sort of review as a little contraption of cloth and medal.
We now talk about a "cyber domain" -- i.e., a military domain similar to the air, land, sea or space domains where the military already operates in -- as a new domain of warfare. We also talk about cyber warfare, cyber terrorism, a "cyber 9/11" and even "cyber Pearl Harbor."
Both the administration and members of Congress have stated that the goal is to provide government and the private sector with robust tools to fight cybersecurity threats while still protecting individuals' civil liberties and privacy rights. But their bill fails the test.
As the New York Times itself admitted, traditional security technology such as firewalls and anti-virus were unable to stop recent cyber attacks. So how can organizations prevent such targeted cyber attacks? Following these four steps to cyber health is a good start.
Although the average computer user has little involvement with such significant security threats, the increasing prevalence of cybercrime places greater responsibility on consumers to protect their individual identities and personal information from hackers.
Like many activists before him, Aaron fell prey to a criminal justice system that entrenches the standing of the already powerful, and which has been used so many times to break unionists and stymie their organizing efforts.
Given the number of successful attacks we've seen in the past year, it's apparent that the security community is in need of a new approach. We can no longer afford to sit back and wait for attacks to hit our perimeter and hope that we can stop them -- that simply does not work.
I appeared on the talk show 'The Fresh Outlook' this weekend to discuss cybersecurity issues and China. Here is a link to the video. I argued for a more nuanced, less panicky approach when dealing with China on this sensitive subject. Here are some more thoughts.
Front-page news this week that Chinese cyber hacking may have been sanctioned by the Chinese military has once again drawn significant attention to the critical need for the United States to step up the protection of its intellectual property.
Twitter may be in the hackers' bullseye for now, but we can help reduce these threats by owning our security, instead of sitting around and hoping you don't have to deal with a fiasco.
There is an adage in business that says that you should only compete when you have a competitive advantage. When it comes to cybersecurity, Maryland has a whole host of competitive advantages.
For his latest subversive intervention, the self-described "contemporary artist and pirate" Paolo Cirio wants to give you the offshore tax benefits en...
As news of major breaches roll in like waves on a storm-eroded beach, the likelihood increases that the next war we fight will be waged on computers aimed at crippling the systems that keep the wheels of government and daily life turning.