When asked what keeps him up at night, Comey responded without hesitation, "What keeps me up at night probably these days is the ISIL threat in the homeland, and I worry very much about what I can't see."
We buy and sell online all the time. But every time we make a transaction in cyberspace, we run the risk of our credit card numbers and other personal information ending up in the wrong hands. Glitch or hacker, anytime something goes wrong we are vulnerable.
The Internet is an infinitely long tunnel filled with vulnerabilities. There will always be threats from hackers and foreign meddlers. But if government and private business can learn to work together - to share information and resources - we can do a much better job of managing the risk.
In this age when objectionable activity can be addressed through hacking that leaves permanent reputational damage, data-governance policies must be a top priority - and not only for financial institutions that can hedge their risks but also those companies that cannot.
Ashley Madison, the popular and much-maligned website for people who want to have extramarital affairs, was hacked this week. The headlines have read,...
Cybersecurity threats change on a daily basis, and BSA member companies are at the forefront of these battles. BSA urges the Senate to pass legislation that gives a helping hand to these companies and provides government necessary tools in the continuing fight against cyber crime.
If foreign governments can hack into U.S. government and defense systems, why would anyone think that foreign interests couldn't also hack into U.S. elections? It's important that we start talking about these risks because a "hack attack" could happen sooner than we think.
What kind of United Nations would we invent if we were designing it from scratch today?
Reputation. It is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke.
I gained dubious distinction for arguing that a new form of encryption is not merely the techies' major gift to terrorists and criminals -- but also a gross violation of the constitution! Hence, it should be outlawed.
On July 3rd, the top choice for the UN's first digital privacy investigator, Katrin Nyman-Metcalf, was rejected by the German president of the Human Rights Council (UNHRC), who cited complaints from activist groups that she was not a strong enough critic of government surveillance.
So much for last month's U.S.-China Strategic and Economic Dialogue in Washington, which has left U.S. security analysts convinced the United States is getting nowhere with China. This was evident as President Obama expressed concern about China's increasingly troublesome cyber and maritime behavior.
You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.
As the Internet spreads its tentacles into every nook of society, attacks are rapidly increasing against individuals, companies, governments, and the very Net infrastructure upon which they all rely. The attackers range from cyber criminals to non-state actors like ISIS and nation-states. But law enforcement, government regulation, and military response are not keeping up.
FBI Director James Comey published a column on July 6, 2015, calling for a robust public debate about the benefits and costs of strong encryption that protects users' privacy and overall network security. I join Director Comey in that call.
The anonymity offered by the Internet allows people to exhibit personality traits that cannot be exhibited in real life. The emotional detachment of the screen makes interactions less real, allowing less censorship. But is there a direct connection between the loss of empathy and Internet use, or is it merely mass hysteria?