I surrendered to the U.S. Marshals Service after a week of constructively avoiding the FBI while I negotiated (through my attorney mostly, though at times in joint conference calls) with the U.S. Attorney's Office for the Southern District of New York.
Many Western observers fear that cyber reform based on the principle of internet sovereignty might legitimize authoritarian control and undermine the cosmopolitan promise of the multistakeholder system. China, however, benefits too much from the current system to pose a credible alternative.
CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.
It's also important to have a solid understanding of the benefits and hindrances of both centralized and decentralized program models before selecting the right one for your organization.
While it is disconcerting that there isn't a more robust incident response culture out there, perhaps more worrisome is the seeming lack of best practices pointed at heading off the problem before it happens. That's where a new term comes into play.
Digital parents are active partners in their child's digital life and must set an example for smart Internet use. Apart from teaching computer skills to children, the digital parent is best suited to guide the child on issues of online safety, and digital citizenship.
Quantum computers are already here in a limited form, and fully functional versions are on the way. They will be as transformative for mankind as were the mainframe computers, personal computers, and smartphones that we all use. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.
Embarrassing emails from Sony executives and Hollywood celebrities got the headlines and the jeering tweets, but the hack, reportedly coming from North Korea, was a devastating cyber-takedown of the $20 billion company.
Just because it's hard to understand how cloud computing works, many managers feel paranoid about cloud safety. Ease their minds by debunking three of the most pervasive cloud security myths.
Individuals, Companies, Governments and Brands need to pay careful attention to the correlation between search, social media and reputation control and management. If it is left to the Internet, you will not be happy with the results.
In the past few years more than 80 innovative startup companies as of April 2015 have been valued at more than $1 billion. With the most innovative and those with the most potential reaching well beyond this mark.
As someone interested in joining the IT workforce, or someone who is already involved with IT but looking to further their career, cybersecurity - as a specialization - offers a number of benefits and advantages. If you've never considered training in IT security, now is the time to reconsider.
A monster storm is on a collision course with New York City and an evacuation is under way. The streets are clogged, and then it happens. Every traffic light turns red.
Can print magazines survive, thrive and surprise, what with all the existing online, digital and mobile fare? Absolutely, say media industry experts, adding that those who have declared magazines' demise are off-track.
Unethical abuse of communication is not new. The rabbinic scholar, Rabbeinu Gershom, lived a thousand years ago and was considered one of the earliest and greatest scholars of the Ashkenazi Jewish community.
Technology is part of our lives. Now criminals no longer have to break in to steal our valuables, violate our privacy or harm our loved ones. They can and do terrorize us remotely from under the cover of darkness afforded them by the Internet of Things.