There's now a technology to replace almost everything in your wallet. Your cash, credit cards, and loyalty programs are all on their way to becoming obsolete.
Productivity is seriously hindered once an internet blacklisting is placed on a company as a result of zombie attacks or low security posture. Don't let this happen to your company.
Cyber criminals know that their electronic attacks are likely to be both successful and profitable, and therefore no one should expect any drop in the pace or intensity of such attacks. There are steps companies can take to minimize the losses associated with such attacks.
If the government ran (or helped launch) a "trustable" federated identity (TFI) service using technology available today from the private sector, that could go a long way to securing our computing infrastructure.
Health insurance provider Anthem announced late Wednesday, Feb. 4 that it had experienced a massive security breach which exposed the information of up to 80 million of its current and former customers, as well as employees.
If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.
The last several years have been good for criminal hackers and bad for consumers. From last year's unprecedented string of major retailer breaches to the massive JP Morgan hack and Sony's epic debacle, hackers have been almost unstoppable. So what should consumers expect for 2015?
For the most part, of course, technology today makes our lives simpler. Except when someone won't get off of our cloud, and we feel, as my friend said after losing her iPad, "lost, stupid, untethered, paranoid and violated."
It's important to understand that your startup already faces some security risks, even if it doesn't have a BYOD program. About half of employees in the U.S. admit to storing work-related information on their personal devices whether their employees have BYOD programs or not.
If a motivated hacker targeted you, you literally would not know you had been attacked until after it was over. From a skilled hacker's point of view, you have glass windows, glass doors, the lights are off, there's nobody home and you left the back door open.
For the U.S. federal government to effectively build its cyber workforce of the future, agencies must consider adopting new approaches and technologies to streamline critical aspects of recruiting, hiring, workforce planning, and training.
Even when you shop with the latest, chip-laden credit card, retailers' computers will still store your card number in easily readable form, leaving it as vulnerable as in the past to criminal theft.
If we do not deal with this problem, the risks are enormous. First businesses and then the public will lose faith in everything they see on their screens, and the Internet will cease to function as perhaps the most useful tool ever created.
As the president stated, to ensure a more prosperous future, we must continue to focus on education. At the K-12 level, we must equip students with the knowledge and skills they need to successfully navigate post-secondary education and their careers.
Today, the technology industry is more powerful and better organized than it was when it won the first Crypto War. However, I am concerned that the industry underestimates the threat posed by regulators reluctant to use strong crypto.
We have the social network built, tested and it is jam packed with anti-bullying technology and new uses of anti-cyber war technology and processes to eliminate fake accounts and protect kids online.