Most data is stored by states and businesses. The question of data tracking and reporting by states and business is a current focus of digital policy discussions.
Encryption is becoming a standard item of the journalism toolkit, a must-have for anyone hoping to report on sensitive issues that might upset institutions of power. And it's not just the NSA journalists and sources need to protect themselves from.
While no system on the internet is 100 percent secure, Taiwan has made great strides to reduce the risks to government agency systems.
To maximize effectiveness, the composition of a corporate board should reflect its customers, the employees of the company and even other stakeholders such as investors.
Dealing with security issues in business can be scary. And just like dealing with zombies, giant meteors and any apocalyptic scenario, your business should be ready with mitigation and contingency plans.
No matter how big or small your company is we all have something to protect. No matter how many layers of security we have in place, people continue to be the weakest link in their company's Cyber security plan.
It's easy to pontificate about how to properly manage the fallout from cyber attacks, but a lot harder to actually do it, as Target has learned since its landmark Christmas 2013 uber-breach.
Although there is no foolproof way to prevent identity theft or other security risks, cutting down on the amount of easy-to-change mistakes you make on a daily basis can help make you less of a target.
In the search for analogies to get a better handle on the multifaceted cyber threat, we should not ignore the green movement. Consider the Aria hotel in Las Vegas, which is famous for more than its slot machines -- it is also known for its wet towels.
I'm always raving about the latest innovation so I figured I should also present the other side of the coin.
"The Story" should never define us. We give "The Story" credence when we choose to react to sensationalized media and place judgment, when the only evidence we have is text on the Internet.
It's never a good idea to connect to the public WiFi network at a hotel (or anywhere else for that matter), but here's yet another reason why travelers should be careful - a new report found that the WiFi router used by most hotels is vulnerable to hackers.
Unless healthcare executives begin making significant changes now to their security setups, we could see many more breaches hit this industry.
"USB Killer" is a device, which can literally fry your computer. The device was hand-made by a Russian hacker, nicknamed as Dark Purple.
Our kids aren't all that different then we were at this age. But their access to social media makes their quickly made decisions capable of being a little bigger, a little louder, have a little more impact, a bigger punch, if you will.
We are placing far too much trust and reliance in technology. Despite all of our advances in artificial intelligence, the most powerful computer we know of is the human mind. But there is no system or technology that can eradicate the potential consequences of human error.