With cloud computing, the opportunity is clear. Public IT cloud revenue will grow to more than $70 billion by 2015.
The Constitution Project has worked as part of a broad coalition of privacy and civil liberties advocates to ensure that any cybersecurity bill incorporates robust safeguards for privacy and civil liberties.
In 1997, when influential annual hacking conference Black Hat was founded, the average person could be excused for not paying attention to what was happening in the hacker underground. But today it's time for everyone to learn about hacking threats.
Working with researchers from Yale, Berkeley and Columbia University, Arturo Bejar and his team are tasked with improving the tools that enable Facebook users to report and resolve problems.
It doesn't take a tech expert to tell you that passwords such as "password" and "123456" are just lame.
While frequent data breaches may have desensitized some consumers to identity theft, it's still important to pay attention to early warning signs your info is being used illegally, no matter how creative, silly or transparent a scam may seem.
Grasping best to how manage hardware vulnerabilities is difficult since the current supply chain involves many companies, operating in many countries. But there are not enough U.S. manufacturers to allow the Pentagon to buy domestically.
The DNS Changer virus may not have caused the havoc many expected, but don't get too complacent -- that's just one of a number of nasty viruses and malware out there waiting to get a hold of your system. Is your smartphone next?
Summertime is always an excellent time to reflect, recharge and catch up on reading you've been meaning to read for longer than you can remember. My ...
Cybersecurity has justifiably become a front-burner policy concern for governments around the world. But what happens when security regulations are effectively used to bolster the prospects of local firms at the expense of foreign competitors?
Their names may sound funny but their financial consequences are not: "Phishing," "smishing" and "vishing" are just a few of the ways criminals can gain access to your financial or personal information via your computer or smartphone.
I suddenly thought that maybe this was my mother crying out for help. Maybe she's selling Viagra on the side, living undercover in Madrid, or trying to set up an adoption. The other reality might be one of the scariest things that can happen to tech-savvy elderly parents: getting hijacked on their computers.
If you want to guess what your teen is doing at any given moment, you have a very high probability of guessing correctly if you suspect that they are on some form of social media.
Some find these extra cautions a waste of time: Are we willing to pay for the cost of convenience to stay so safe? Some will, and some won't.
New philosophies call all in doubt, the more so as the accelerating rates of technological advance -- celestial, terrestrial, and subliminal -- overrun the frontiers between science, magic, and religion.
There's been a lot of anger recently concerning LinkedIn's shabby treatment of its user community. First, a Russian hacker was able to steal approxima...