In the 21st century and the post-9/11 global risk environment, we are seeing the emergence of a new type of technology crossover involving national security and the commercial tech market -- or 'cross-convergence.'
The timely and appropriate sharing of information about cyber-security threats, vulnerabilities, lessons learned, and best practices is imperative to building a collaborative framework to defend networks against attacks. This can and should be done in a manner that respectful of privacy.
Many of the industry's top bloggers use social media to inform their followers about a stock and its movement. Social media functions as a way for investors to become aware of a company's news before it becomes stale.
In today's modern frictionless economy, the principal requisite for growth and order is the free flow of sensitive information, banking transactions and private data on a global scale.
This week, the Global Cyberspace Conference takes place in The Hague (16-17 April). In March, UNESCO hosted a conference on Connecting the Dots in Digital Space. The NETmundial Initiative had a meeting in Stanford recently.
Most data is stored by states and businesses. The question of data tracking and reporting by states and business is a current focus of digital policy discussions.
Encryption is becoming a standard item of the journalism toolkit, a must-have for anyone hoping to report on sensitive issues that might upset institutions of power. And it's not just the NSA journalists and sources need to protect themselves from.
While no system on the internet is 100 percent secure, Taiwan has made great strides to reduce the risks to government agency systems.
To maximize effectiveness, the composition of a corporate board should reflect its customers, the employees of the company and even other stakeholders such as investors.
Dealing with security issues in business can be scary. And just like dealing with zombies, giant meteors and any apocalyptic scenario, your business should be ready with mitigation and contingency plans.
No matter how big or small your company is we all have something to protect. No matter how many layers of security we have in place, people continue to be the weakest link in their company's Cyber security plan.
It's easy to pontificate about how to properly manage the fallout from cyber attacks, but a lot harder to actually do it, as Target has learned since its landmark Christmas 2013 uber-breach.
Although there is no foolproof way to prevent identity theft or other security risks, cutting down on the amount of easy-to-change mistakes you make on a daily basis can help make you less of a target.
In the search for analogies to get a better handle on the multifaceted cyber threat, we should not ignore the green movement. Consider the Aria hotel in Las Vegas, which is famous for more than its slot machines -- it is also known for its wet towels.
I'm always raving about the latest innovation so I figured I should also present the other side of the coin.
"The Story" should never define us. We give "The Story" credence when we choose to react to sensationalized media and place judgment, when the only evidence we have is text on the Internet.