FBI Director James Comey published a column on July 6, 2015, calling for a robust public debate about the benefits and costs of strong encryption that protects users' privacy and overall network security. I join Director Comey in that call.
The anonymity offered by the Internet allows people to exhibit personality traits that cannot be exhibited in real life. The emotional detachment of the screen makes interactions less real, allowing less censorship. But is there a direct connection between the loss of empathy and Internet use, or is it merely mass hysteria?
Today's political campaigns are using the latest digital tools. Since the presidential race is in full swing, we thought we'd be extra patriotic this Fourth of July and offer free advice as to how the campaigns can protect against cyber breaches and take downs.
The U.S. Congress, supported by the National Cyber Security Alliance (NCSA), has designated June as National Internet Safety Month. As we near the end of the month, what are the lessons we have learned about cyber safety so far?
For almost a month, the Office of Personnel Management (OPM) has been engaged in damage control after publicly disclosing that it was the victim of a massive data breach of government employee data.
Today, there is a hyper awareness surrounding cyber security. A mad rush has ensued to make sure our businesses are protected. But we still hear of breaches and their effects on cyber safety. It seems to be an endless cycle that only gets worse.
Unfortunately, we see an alarming amount of revenge porn cases every month. Based on our experience working with this issue, we put together a guide that can hopefully inform, prevent, or at least help the victims of revenge porn fight back.
There are things in this world that are far less enjoyable than having your website knocked offline to be certain. That being said, it can have a massive impact to your day or that of a company trying to make a living by selling their wares online.
As a result of the World Wide Web becoming the 21st century version of Central Park after midnight, increased security protocols have been invented and initiated. One of the most reliable and frequently used is the Virtual Private Network.
As these examples illustrate, if our laws and policies continue to focus on one or the other sector, the government will continue to use the private sector to run around the limitations imposed on the public sector's activities and powers.
The U.S. and several Southeast Asian nations have been harshly critical of China for expanding several coral reefs through dredging in the South China Sea, and building a runway on one of them, actions that the Americans fear may be used for military operations.
We are in danger of losing the most pressing global security and justice challenges of our times. That's what motivates a prestigious blue ribbon panel, co-chaired by former U.S. Secretary of State Madeline Albright and Professor Ibrahim Gambari, the former Foreign Minister of Nigeria and UN Under-Secretary-General for Political Affairs.
Given the epic battle in the 2015 NBA Finals between the Cleveland Cavaliers and the Golden State Warriors, I asked Dr. J to share her thoughts about basketball lessons as related to cybersecurity and her new CISO responsibilities. Here is what Dr. J had to say.
Joseph Nye is a University Distinguished Professor at Harvard University. He was also the former Dean of Harvard's John F. Kennedy School of Government, and an Assistant Secretary of Defense under the Clinton administration.
There are three reasons why the situation is so dire and why it was a piece of cake for hackers to rip off more than 4 million personnel records from the little known but important Office of Personnel Management (OPM).
In the future, what countries do with digital weapons may be more destructive than boots on the ground or drones in the sky.