For now, consumers are largely on their own when it comes to stopping cybercriminals. You can't rely on over-the-counter antivirus to stop any of the advanced persistent threats and malware that are becoming so commonplace today.
If a nonprofit, like the one described, is attacked, not only will records be compromised, but also the reputation of the agency will be destroyed, probably along with the nonprofit organization itself.
At this week's RSA Conference in San Francisco, the world's leading cyber minds aren't just focusing on international super-hackers and possible future attacks on the electric grid. Do you know what else they're worrying about? Your home.
With winter melting, and spring coming into view, lots of folks are re-emerging and looking to get involved. My team and I generated a list of 5 ways to get involved in tech this spring.
In the 21st century and the post-9/11 global risk environment, we are seeing the emergence of a new type of technology crossover involving national security and the commercial tech market -- or 'cross-convergence.'
The timely and appropriate sharing of information about cyber-security threats, vulnerabilities, lessons learned, and best practices is imperative to building a collaborative framework to defend networks against attacks. This can and should be done in a manner that respectful of privacy.
Many of the industry's top bloggers use social media to inform their followers about a stock and its movement. Social media functions as a way for investors to become aware of a company's news before it becomes stale.
In today's modern frictionless economy, the principal requisite for growth and order is the free flow of sensitive information, banking transactions and private data on a global scale.
This week, the Global Cyberspace Conference takes place in The Hague (16-17 April). In March, UNESCO hosted a conference on Connecting the Dots in Digital Space. The NETmundial Initiative had a meeting in Stanford recently.
Most data is stored by states and businesses. The question of data tracking and reporting by states and business is a current focus of digital policy discussions.
Encryption is becoming a standard item of the journalism toolkit, a must-have for anyone hoping to report on sensitive issues that might upset institutions of power. And it's not just the NSA journalists and sources need to protect themselves from.
While no system on the internet is 100 percent secure, Taiwan has made great strides to reduce the risks to government agency systems.
To maximize effectiveness, the composition of a corporate board should reflect its customers, the employees of the company and even other stakeholders such as investors.
Dealing with security issues in business can be scary. And just like dealing with zombies, giant meteors and any apocalyptic scenario, your business should be ready with mitigation and contingency plans.
No matter how big or small your company is we all have something to protect. No matter how many layers of security we have in place, people continue to be the weakest link in their company's Cyber security plan.
It's easy to pontificate about how to properly manage the fallout from cyber attacks, but a lot harder to actually do it, as Target has learned since its landmark Christmas 2013 uber-breach.