There are things in this world that are far less enjoyable than having your website knocked offline to be certain. That being said, it can have a massive impact to your day or that of a company trying to make a living by selling their wares online.
As a result of the World Wide Web becoming the 21st century version of Central Park after midnight, increased security protocols have been invented and initiated. One of the most reliable and frequently used is the Virtual Private Network.
As these examples illustrate, if our laws and policies continue to focus on one or the other sector, the government will continue to use the private sector to run around the limitations imposed on the public sector's activities and powers.
The U.S. and several Southeast Asian nations have been harshly critical of China for expanding several coral reefs through dredging in the South China Sea, and building a runway on one of them, actions that the Americans fear may be used for military operations.
We are in danger of losing the most pressing global security and justice challenges of our times. That's what motivates a prestigious blue ribbon panel, co-chaired by former U.S. Secretary of State Madeline Albright and Professor Ibrahim Gambari, the former Foreign Minister of Nigeria and UN Under-Secretary-General for Political Affairs.
Given the epic battle in the 2015 NBA Finals between the Cleveland Cavaliers and the Golden State Warriors, I asked Dr. J to share her thoughts about basketball lessons as related to cybersecurity and her new CISO responsibilities. Here is what Dr. J had to say.
Joseph Nye is a University Distinguished Professor at Harvard University. He was also the former Dean of Harvard's John F. Kennedy School of Government, and an Assistant Secretary of Defense under the Clinton administration.
There are three reasons why the situation is so dire and why it was a piece of cake for hackers to rip off more than 4 million personnel records from the little known but important Office of Personnel Management (OPM).
In the future, what countries do with digital weapons may be more destructive than boots on the ground or drones in the sky.
The omnipresence of the Internet in modern society makes most digital policy issues transversal. Yet, a transversal approach is more an exception than a rule in digital policy, on both national and international level.
There is one area in which Apple and Cook are being coy and its time for Americans to call the tech giant out on that.
The hack that resulted in the theft of information on 4 million government employees didn't need to happen. We had plenty of warning and next to nothing was done.
The competitions designed by XPRIZE touch the furthest reaches of human achievement in fields like health care, oceanography and space exploration. We are currently designing a prize competition in the field of cybersecurity.
I like things simple. When things are simple they are easier to explain, document, implement, revise and manage. Take defense in-depth. Defense in-depth is a term, which means, security implemented in layers.
As a cyber security professional balancing the unique needs of the organization with industry best business practices is always a challenge. Tactics, techniques, and procedures are often a reflection of an organization's prevailing mindset.
Email addresses are like opinions--nearly everyone has one. It is the most public piece of personal information you have besides your name. But what you may not know about your email address could hurt you.