As these examples illustrate, if our laws and policies continue to focus on one or the other sector, the government will continue to use the private sector to run around the limitations imposed on the public sector's activities and powers.
The U.S. and several Southeast Asian nations have been harshly critical of China for expanding several coral reefs through dredging in the South China Sea, and building a runway on one of them, actions that the Americans fear may be used for military operations.
We are in danger of losing the most pressing global security and justice challenges of our times. That's what motivates a prestigious blue ribbon panel, co-chaired by former U.S. Secretary of State Madeline Albright and Professor Ibrahim Gambari, the former Foreign Minister of Nigeria and UN Under-Secretary-General for Political Affairs.
Given the epic battle in the 2015 NBA Finals between the Cleveland Cavaliers and the Golden State Warriors, I asked Dr. J to share her thoughts about basketball lessons as related to cybersecurity and her new CISO responsibilities. Here is what Dr. J had to say.
Joseph Nye is a University Distinguished Professor at Harvard University. He was also the former Dean of Harvard's John F. Kennedy School of Government, and an Assistant Secretary of Defense under the Clinton administration.
There are three reasons why the situation is so dire and why it was a piece of cake for hackers to rip off more than 4 million personnel records from the little known but important Office of Personnel Management (OPM).
In the future, what countries do with digital weapons may be more destructive than boots on the ground or drones in the sky.
The omnipresence of the Internet in modern society makes most digital policy issues transversal. Yet, a transversal approach is more an exception than a rule in digital policy, on both national and international level.
There is one area in which Apple and Cook are being coy and its time for Americans to call the tech giant out on that.
The hack that resulted in the theft of information on 4 million government employees didn't need to happen. We had plenty of warning and next to nothing was done.
The competitions designed by XPRIZE touch the furthest reaches of human achievement in fields like health care, oceanography and space exploration. We are currently designing a prize competition in the field of cybersecurity.
I like things simple. When things are simple they are easier to explain, document, implement, revise and manage. Take defense in-depth. Defense in-depth is a term, which means, security implemented in layers.
As a cyber security professional balancing the unique needs of the organization with industry best business practices is always a challenge. Tactics, techniques, and procedures are often a reflection of an organization's prevailing mindset.
Email addresses are like opinions--nearly everyone has one. It is the most public piece of personal information you have besides your name. But what you may not know about your email address could hurt you.
In this three-part video series, you'll hear from some of the giants in the Internet and cyber security fields as they relate stories of cybercrime becoming a worldwide business, privacy becoming an antiquated idea, the discovery of Stuxnet and the real possibility of cyber warfare.
These skills need to be fostered in this year's graduates and those that follow in the years to come if they are to successfully take on and conquer the challenges before them and those that will arise.