Cybersecurity threats change on a daily basis, and BSA member companies are at the forefront of these battles. BSA urges the Senate to pass legislation that gives a helping hand to these companies and provides government necessary tools in the continuing fight against cyber crime.
If foreign governments can hack into U.S. government and defense systems, why would anyone think that foreign interests couldn't also hack into U.S. elections? It's important that we start talking about these risks because a "hack attack" could happen sooner than we think.
What kind of United Nations would we invent if we were designing it from scratch today?
Reputation. It is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke.
I gained dubious distinction for arguing that a new form of encryption is not merely the techies' major gift to terrorists and criminals -- but also a gross violation of the constitution! Hence, it should be outlawed.
On July 3rd, the top choice for the UN's first digital privacy investigator, Katrin Nyman-Metcalf, was rejected by the German president of the Human Rights Council (UNHRC), who cited complaints from activist groups that she was not a strong enough critic of government surveillance.
So much for last month's U.S.-China Strategic and Economic Dialogue in Washington, which has left U.S. security analysts convinced the United States is getting nowhere with China. This was evident as President Obama expressed concern about China's increasingly troublesome cyber and maritime behavior.
You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.
As the Internet spreads its tentacles into every nook of society, attacks are rapidly increasing against individuals, companies, governments, and the very Net infrastructure upon which they all rely. The attackers range from cyber criminals to non-state actors like ISIS and nation-states. But law enforcement, government regulation, and military response are not keeping up.
FBI Director James Comey published a column on July 6, 2015, calling for a robust public debate about the benefits and costs of strong encryption that protects users' privacy and overall network security. I join Director Comey in that call.
The anonymity offered by the Internet allows people to exhibit personality traits that cannot be exhibited in real life. The emotional detachment of the screen makes interactions less real, allowing less censorship. But is there a direct connection between the loss of empathy and Internet use, or is it merely mass hysteria?
Today's political campaigns are using the latest digital tools. Since the presidential race is in full swing, we thought we'd be extra patriotic this Fourth of July and offer free advice as to how the campaigns can protect against cyber breaches and take downs.
The U.S. Congress, supported by the National Cyber Security Alliance (NCSA), has designated June as National Internet Safety Month. As we near the end of the month, what are the lessons we have learned about cyber safety so far?
For almost a month, the Office of Personnel Management (OPM) has been engaged in damage control after publicly disclosing that it was the victim of a massive data breach of government employee data.
Today, there is a hyper awareness surrounding cyber security. A mad rush has ensued to make sure our businesses are protected. But we still hear of breaches and their effects on cyber safety. It seems to be an endless cycle that only gets worse.
Unfortunately, we see an alarming amount of revenge porn cases every month. Based on our experience working with this issue, we put together a guide that can hopefully inform, prevent, or at least help the victims of revenge porn fight back.