Stephen Del Rosso,Program Director, International Peace & Security This article is excerpted from The Carnegie Reporter ...
Despite precautions, cyber attackers can often stay one step ahead of protection mechanisms. Sony, of course, had little in the way of cyber security protections, making it an easy soft target for hackers. But even better protected systems can be penetrated.
To mitigate the damage and restore confidence, Sony Pictures executives need to develop a plan so this is unlikely to reoccur. While this is easier said than done, IT solutions are available to thwart hackers.
As bad as Sony's cave-in, though, is the ridiculously false "shock" at the hackers' success in exposing the emails. There is incredible naiveté from everyone involved.
I find it more than a little ironic that as we wring our collective hands over the interrogation tactics used by the U.S. intelligence community, we are sitting idly by while attackers unknown are torturing and holding hostage an American company.
What is important is that these hacks presage what is going to happen for years to come and at far greater cost than what is being imposed on Sony. The weaponization of code is the most significant development in warfare since the weaponization of fissile material.
The success of the Internet in China over the past 20 years shows that successful foreign companies in China respect China's market environment and abide by China's law and regulations. U.S. companies operating in China show that those who respect the Chinese law can seize the opportunity of China' s Internet innovation and create immense value, while those who chose opposition stand will be isolated by themselves and finally abandoned by the Chinese market.
It seems like there were more companies that had privacy-related problems in 2014 than didn't. And the lucky ones that didn't "get got" were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privacy concerns along with a few emerging dangers.
With new DOD leadership, troops returning to Iraq, and an extension of the U.S. stay in Afghanistan, doing more of the same is clearly not enough; it is time to embrace fresh national security ideas.
We're only a week in to December and there's already been significant cyber security activity. There have been a number of well publicized high profile breaches, malware attacks and phishing attacks as we head in to the final stretch of the year.
China's concept of Internet sovereignty seems likely to result in a diplomatic cul-de-sac. However, Chinese officials will continue to employ sovereignty issues to occupy conference agendas and stall real progress on international cooperation in cyberspace.
MakeSchool, which was originally named MakeGamesWithUs, was born after Ashu Desai and Jeremy Rossmann decided that they needed to fix the educational gap in CS education.
The latest greatest swindlers in the cybercrime racket know you're onto their digital three-card monte, and they've made a few adjustments, putting yet another wrinkle in the corporate-hacking game by targeting top-level employees for major profits.
Flip phones are certainly not "safer" than smartphones.
The Internet--one of history's greatest inventions--is also one of history's greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things.
There's a reason Gmail sent that email to your Spam folder. Leave it there. If you didn't ask for it, don't click on it!