I ran around the house this morning making sure the Java plugin was turned off in all our web browsers on all our computers. Why was I so panicked? Because the Department of Homeland Security issued a warning late this week about Java.
In few places on Earth is censorship undertaken more vigorously than it is in the People's Republic of China. But what does such censorship mean for the rest of the world's Internet users?
In a country where essential components of infrastructure are vulnerable to cyber-attack, cybersecurity is not only an issue of financial interest to private sector companies, but an issue of national security.
2013 will be the year of the mobile security threat. With online technology rapidly moving from computers to the palms of our hands, cybercriminals and hackers are evolving their methods to fit the times.
In the coming weeks, as we've seen every year for the past six, there will be endless reports detailing the digital dangers and identity threats lurking in every corner of our highly networked universe. But to what end?
Unfortunately, while women have made great strides in the realm of foreign policy, they remain underrepresented across the intelligence, defense and security community.
Security and flushing out the bad guys begins with understanding the web of associations between related devices, which helps businesses identify and shut down entire fraud rings. Lastly, online businesses run their highly-customized business rules as the transaction or activity is attempted.
Today, we are in danger of falling into a "cyber weapons gap" -- exaggerating the capabilities of the Chinese People's Liberation Army -- when it comes to waging cyber war.
The stress of holiday shopping often outweighs the joy of gift buying. As the Internet becomes more vital to the holiday buying and giving experience, our increasing online "connectedness" steers us toward an array of digital hazards.
This holiday season, mobile phones and tablets will be one of the top gifts on Christmas lists, and they'll become another digital repository for personal and private information. If you're giving or receiving these devices, take the extra steps to secure your gift with a mobile security option.
Imagine you felt passionate enough about a cause to place yourself in harm's way to support the side you believed in. Now imagine you could do this without leaving your living room and still step into the front lines of the battle.
We are familiar with the threat that cyber-crime poses to the computers around us -- however, we have not yet prepared for the threat it may pose to the computers inside of us.
Innovation is like a gas, it becomes more powerful the more it is compressed. Our hope is that by making it easier for the builders in NYC to meet one another and exchange ideas, we can help this community grow even faster and accomplish even more for bringing our city, our country and our world into the future.
One of the biggest obstacles to online shopping is the fear of fraud or a security scam. Although longtime Internet users may already know how to protect themselves, we're seeing a lot of new people shopping online. And most of us are new to shopping from mobile devices. They too have security risks.
From identity theft to cyber-warfare, our inability to weigh risks in a rational way is costing us big time --- and may ultimately be our undoing.
Do we allow the government liberal powers to control and spy on all electronic communications flowing through the United States? Can we trust the government not to abuse its privileges and respect our privacy rights?