There is one area in which Apple and Cook are being coy and its time for Americans to call the tech giant out on that.
The hack that resulted in the theft of information on 4 million government employees didn't need to happen. We had plenty of warning and next to nothing was done.
The competitions designed by XPRIZE touch the furthest reaches of human achievement in fields like health care, oceanography and space exploration. We are currently designing a prize competition in the field of cybersecurity.
I like things simple. When things are simple they are easier to explain, document, implement, revise and manage. Take defense in-depth. Defense in-depth is a term, which means, security implemented in layers.
As a cyber security professional balancing the unique needs of the organization with industry best business practices is always a challenge. Tactics, techniques, and procedures are often a reflection of an organization's prevailing mindset.
Email addresses are like opinions--nearly everyone has one. It is the most public piece of personal information you have besides your name. But what you may not know about your email address could hurt you.
In this three-part video series, you'll hear from some of the giants in the Internet and cyber security fields as they relate stories of cybercrime becoming a worldwide business, privacy becoming an antiquated idea, the discovery of Stuxnet and the real possibility of cyber warfare.
These skills need to be fostered in this year's graduates and those that follow in the years to come if they are to successfully take on and conquer the challenges before them and those that will arise.
Individuals, Companies, Governments and Brands need to pay careful attention to the correlation between search, social media and reputation control and management.
Every year at this time we anxiously await Symantec's Internet Security Threat Report, hoping that this would be the year that all cybercrooks would disappear. But, as usual, our hopes have been stomped upon by the facts.
More than ever before, journalists who work in dangerous zones understand the importance of technology to improve safety and reduce risk. Orellana, an investigative reporter for La Prensa, Honduras, works in San Pedro Sula, which has the highest murder rate in the world, with 186 murders per 100,000 people. Unwilling to investigate stories with only phone interviews, she enters the turf of drug cartels to interview victims of violence.
The rest of the world pays a heavy price for Pakistan's negligence or incompetence when, for example, Islamabad says it did not know that the world's most wanted terrorist, Osama bin Laden, was hiding in Abbottabad in the backyard of the Pakistan Military Academy, or that a global network of fraudulent degrees such as Axact existed and openly operated from Pakistan.
Hope and fear are close cousins. Great leaders balance the two and approach them in a measured way with resolve. Great technology leaders show how innovation can feed into--and balance--the two.
I surrendered to the U.S. Marshals Service after a week of constructively avoiding the FBI while I negotiated (through my attorney mostly, though at times in joint conference calls) with the U.S. Attorney's Office for the Southern District of New York.
Many Western observers fear that cyber reform based on the principle of internet sovereignty might legitimize authoritarian control and undermine the cosmopolitan promise of the multistakeholder system. China, however, benefits too much from the current system to pose a credible alternative.
CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.