I find it more than a little ironic that as we wring our collective hands over the interrogation tactics used by the U.S. intelligence community, we are sitting idly by while attackers unknown are torturing and holding hostage an American company.
What is important is that these hacks presage what is going to happen for years to come and at far greater cost than what is being imposed on Sony. The weaponization of code is the most significant development in warfare since the weaponization of fissile material.
The success of the Internet in China over the past 20 years shows that successful foreign companies in China respect China's market environment and abide by China's law and regulations. U.S. companies operating in China show that those who respect the Chinese law can seize the opportunity of China' s Internet innovation and create immense value, while those who chose opposition stand will be isolated by themselves and finally abandoned by the Chinese market.
It seems like there were more companies that had privacy-related problems in 2014 than didn't. And the lucky ones that didn't "get got" were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privacy concerns along with a few emerging dangers.
With new DOD leadership, troops returning to Iraq, and an extension of the U.S. stay in Afghanistan, doing more of the same is clearly not enough; it is time to embrace fresh national security ideas.
We're only a week in to December and there's already been significant cyber security activity. There have been a number of well publicized high profile breaches, malware attacks and phishing attacks as we head in to the final stretch of the year.
China's concept of Internet sovereignty seems likely to result in a diplomatic cul-de-sac. However, Chinese officials will continue to employ sovereignty issues to occupy conference agendas and stall real progress on international cooperation in cyberspace.
MakeSchool, which was originally named MakeGamesWithUs, was born after Ashu Desai and Jeremy Rossmann decided that they needed to fix the educational gap in CS education.
The latest greatest swindlers in the cybercrime racket know you're onto their digital three-card monte, and they've made a few adjustments, putting yet another wrinkle in the corporate-hacking game by targeting top-level employees for major profits.
Flip phones are certainly not "safer" than smartphones.
The Internet--one of history's greatest inventions--is also one of history's greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things.
There's a reason Gmail sent that email to your Spam folder. Leave it there. If you didn't ask for it, don't click on it!
co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems Admiral Michael Rogers, Director of the National Security Agency and head of the U...
If the thought of being the unwitting star of your own prime time reality show gives you the willies, consider the recent revelation that more than 73,000 unsecured webcams and surveillance cameras are, as I write this column, viewable on a Russian-based website.
Most parents teach their children to be kind and caring -- but only IRL (in real life). So how do we teach Digital Kindness? My list of Dos and Don'ts gives families a checklist all technology users should memorize -- grown-ups included.
As the founder of an office yoga company, I'm constantly spreading the word about ways to bring yoga into your work day. I write about ways to deal wi...