Virtually all of the world's information moves deep under the sea. Well over 95 percent of everything moving on the global Internet passes through 200 or so highly active cables, some as deep under water as Mount Everest is tall. Recent reports indicate renewed interest by Russian submarine forces in surveillance of our undersea fiber optic cables. The movement of information is the lifeblood of the global economic system: it needs to be more secure from accident and attack.
Patricia Cornwell is known to millions of readers worldwide. She has won nearly every literary award for popular fiction and has authored 29 New York Times bestsellers.
SEOUL -- The solution to privacy concerns lies not in data localization, but in the development of secure systems and the proper use of encryption. Data storage actually means the continuous transfer of data between users, with no regard for Westphalian borders. Policies born of confusion, chaos and confrontation have no place in this new world of opportunities.
Yet another massive data break example, the TalkTalk data breach of "significant and sustained proportions" as quoted from the CEO Chief Executive Dido Harding, is cold comfort for customers, but what lessons must we keep learning?
Marina Kaljurand is Estonia's Minister of Foreign Affairs. Prior to becoming Foreign Minister in July 2015, she was a long-time Estonian diplomat, and an ambassador to the United States, Mexico, Canada, Russia, Kazakhstan and Israel.
How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.
We live in a time when databases have started to include a terrifying amount of extremely intimate information about illnesses, diagnoses, treatments and health issues that nobody should have to fear might become reading material for criminals or their customers.
As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.
E-, virtual, online, and net are gradually disappearing: This is the conclusion reached by the prefix monitoring of ongoing UN-based negotiations on global digital policy (negotiations on the 10-year review of WSIS, the World Summit on the Information Society).
The holiday shopping season is just around the corner, but businesses aren't the only ones that will be profiting from the uptick in consumer spending - cybercriminals will be making plenty of money too.
By: Joe McGauley Credit: Shutterstock No one takes the time to actuall...
Cyberweaponry requires cyberdeterrence and new types of internet shields. Major U.S. corporations spend millions repairing damage from cyber infiltration, but devote hardly any resources to assessing potential risk sources and pre-emptive mitigation.
Steve Jobs is back all over the media and movie screens these days - as Hollywood portrays its take of his genius and his warts. At the end of the day (not the movie), Jobs' greatest notoriety may indeed be elevating Tim Cook to be his successor.
If you're like most people, Big Data may not mean much to you yet. It might even just make your eyes glaze over. Like the cloud or cybersecurity or bioprinting, it's just one more thing you don't have to know about -- until you do.
Computers, smart phones and other internet-enabled mobile devices are the primary vehicles we use to communicate and exchange information. Although this exposes us to potential cyber security risks, there are ways to limit the negative impact of a security breach.
The email fraud landscape is a constantly evolving one. Cybercriminals are always coming up with new and sophisticated ways to leverage email to do ha...