We have the social network built, tested and it is jam packed with anti-bullying technology and new uses of anti-cyber war technology and processes to eliminate fake accounts and protect kids online.
Obtaining cybersecurity insurance coverage is an important part of a company's overall cybersecurity plan and companies should consult with legal counsel to most effectively meet their overall goals.
Ongoing events and radical changes affecting today's society require a reassessment of power balances and technological advancements, while also reaffirming the urgency, already expressed in several public events, to draft and implement common policies at an International level.
It is time to take bold and decisive action to stop these dangerous and embarrassing hacks before they cause further damage and erode the confidence that is vital for this country's economy to continue on the road to recovery.
The unprecedented rise of the connected age, like any big societal change, leads to unexpected and dramatic questions about safety and security. But the concept of security requires innovators and their products' users to work together.
Security comes down to protecting people, and if you can't do that your security system is faulty.
Cut through all the clutter and I believe that the lessons of 2014 mean that there are five technologies that all small businesses must embrace in the New Year.
Do not give anyone remote access to your computer! If someone calls you, claiming to be a Tech Support Guru who is positive you have a virus, do not believe it!
While the risk of cyber attacks is growing, it's important for small and medium-sized businesses to keep perspective and focus on the real threats that are most likely to target their operations.
One conclusion directly related to cyber vulnerabilities is learning from how the monetary, banking and financial systems adapted over the decades to fend off crooks and scamsters. A second conclusion is that "ready, fire, aim" is not always a good response to every crisis.
The Sony Hack was not even one of the ten largest hacks of 2014. Though large, it actually only ranks as the 33rd largest of the year in terms of number of records breached. EBay actually suffered the largest data breach of 2014 (and the second largest since 2005) with more than 150 million records compromised.
With all the data breaches and website hacking that have been going on, how on earth could big brands like AT&T, The New York Times, and Macy's needlessly expose their users' passwords?
In that bygone era of punched cards and tabulating machines, a computer disaster might have been a dropped box of cards. We couldn't do anything very exotic with these simple machines; the Internet and home computers were in no one's crystal ball, but neither was the worry of getting hacked.
China needs to know how the U.S. views future arrangements on the Korean Peninsula. Of all of China's worries about North Korea, the most serious is that regime collapse -- probably followed by state failure -- could be perceived as a Chinese defeat and a U.S. victory, with Korea reunified as part of the U.S. alliance system.
Thinking we'd finally done everything we needed to do to play the stinking game, we turned back to the Xbox, which had frozen up completely. No worries. We turned it off and let it reboot, but when it came back on, it immediately froze up again.
Such is the disappointing state of the press in Turkey where the Erdogan administration's actions have rightfully earned the suspicion of the Turkish people and democratic nations across the globe that fear, with good cause, that the assault on the media is only the beginning. Not all is lost for Erdogan yet.