Enhancing cybersecurity is important--and Congress should take meaningful steps to protect cyberspace. But the Senate's Cybersecurity Information Sharing Act (CISA) would be a mistake.
While there is nothing new about espionage or hacking, the size and depth of these attacks make them extremely serious. The ubiquity of technology and poor security have caused both crime and surveillance to skyrocket in frequency and specificity.
In the past few weeks, we have seen ample evidence that technology breaches have replaced product recalls as the crisis management challenges of our present and future.
When asked what keeps him up at night, Comey responded without hesitation, "What keeps me up at night probably these days is the ISIL threat in the homeland, and I worry very much about what I can't see."
We buy and sell online all the time. But every time we make a transaction in cyberspace, we run the risk of our credit card numbers and other personal information ending up in the wrong hands. Glitch or hacker, anytime something goes wrong we are vulnerable.
The Internet is an infinitely long tunnel filled with vulnerabilities. There will always be threats from hackers and foreign meddlers. But if government and private business can learn to work together - to share information and resources - we can do a much better job of managing the risk.
In this age when objectionable activity can be addressed through hacking that leaves permanent reputational damage, data-governance policies must be a top priority - and not only for financial institutions that can hedge their risks but also those companies that cannot.
Ashley Madison, the popular and much-maligned website for people who want to have extramarital affairs, was hacked this week. The headlines have read,...
Cybersecurity threats change on a daily basis, and BSA member companies are at the forefront of these battles. BSA urges the Senate to pass legislation that gives a helping hand to these companies and provides government necessary tools in the continuing fight against cyber crime.
If foreign governments can hack into U.S. government and defense systems, why would anyone think that foreign interests couldn't also hack into U.S. elections? It's important that we start talking about these risks because a "hack attack" could happen sooner than we think.
What kind of United Nations would we invent if we were designing it from scratch today?
Reputation. It is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke.
I gained dubious distinction for arguing that a new form of encryption is not merely the techies' major gift to terrorists and criminals -- but also a gross violation of the constitution! Hence, it should be outlawed.
On July 3rd, the top choice for the UN's first digital privacy investigator, Katrin Nyman-Metcalf, was rejected by the German president of the Human Rights Council (UNHRC), who cited complaints from activist groups that she was not a strong enough critic of government surveillance.
So much for last month's U.S.-China Strategic and Economic Dialogue in Washington, which has left U.S. security analysts convinced the United States is getting nowhere with China. This was evident as President Obama expressed concern about China's increasingly troublesome cyber and maritime behavior.
You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.