SHANGHAI -- On the American West Coast, it will be a picture of entrepreneurial optimism characterized by growth and opportunities. Back East at the political center inside the Beltway, a chilly atmosphere with shrill rhetoric awaits Xi.
The hack of AshleyMadison.com has been a wakeup call to many Americans that there's no such thing as a "safe" secret on the web -- but it should also be a wake-up call to another important group: the 28 million small businesses scattered across the U.S.
International law, while informative, does not spell out how nations (or companies under their jurisdiction) should go about enhancing their cybersecurity to account for emerging due diligence obligations. As a result, it's helpful to consider what leading nations and firms are doing in this regard.
As countries like the United Kingdom, Brazil, and China develop their data policies, the U.S. can offer a model that respects rule of law and individual rights. We can do it. This can happen.
It is with more than a little bemusement that I can report that Augusta, Georgia, is one of the hottest, cutting edge high tech centers in the country today, growing by leaps and bounds and poised to become a major center for cyber security.
The OPM hack put them even further ahead by identifying 21 million American adults that have applied to work for the Federal government. No doubt espionage for China will remain the primary use for this data, but just as we update our view of identity in the 21st century so too might the PRC update its plans the use of such data.
Will forensic computer technicians be able to find a Hillary Clinton email if it was deleted from her server? It's about the most popular question I get asked these days. So, for your reading pleasure, a primer on email deletion, data destruction, and hard drive erasing.
Though I am not a psychologist, I have spent many years managing teams, leading projects, and advising people - experiences that have helped me realiz...
Machine learning models are only as good as the quality of the data sets on which they are based and the algorithms they employ. However, if the financial industry is any guide, the opportunity for security startups pioneering this approach is hugely exciting.
As cars continue to rely on computers to increase capabilities, it leaves open to the possibility that any car can be hacked. A simple malware program in a car's software can cause havoc on the roads and ultimately take the lives of many people.
The Internet is abuzz over last month's major WordPress update. But despite the update, some people are still skeptical of using WordPress, chiefly because of some baseless myths about the platform. Here are the five most prevalent -- and why they're wrong.
I have hesitated to tell my story, mostly because he's still out there and I don't know where he is or if he is still peering into my social media. I've tried to block him out of my mind but realize sharing my story has the potential to bring awareness to an important issue of cyber education and safety for youth.
As the FBI investigates the private email account Hillary Clinton used while serving as Secretary of State, more questions are being raised about just how safe and secure her private email server really was. Of course, the biggest question of all is, could it have been hacked?
In the case of the Ashley Madison leak, the public doesn't seem to care much about the gravity of the crime and the long-term consequences of the hack. The victims are cheaters, mostly male, and they deserve it all. It's a poetic karma in full force, right? Wrong, I say.
Sometimes teen romance can be downright dangerous. Early relationships can be traps for young people, spoiling months or years of their lives and setting the pattern for future coupling.
Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.