The challenges are immediate and well-known, but the ingredients for more effective cybersecurity are within our grasp. It's important to understand two of the elements that are shaping our collective response to cybersecurity challenges
Sheryl Sandberg's advice -- Lean In -- is a positive and valuable one. It's ironic, however, that the company she helps run makes it hard for women business owners to do just that.
Some would argue that pornography is harmless. Others argue that it's immoral and brain changing. But, that's not the purpose of this article. Here,...
Like hanging on to clothes that don't fit, most of America's premier companies are starting to do essentially the same thing with data. The reason? They recognize the opportunity cost of not collecting data.
No, I don't support hacking -- but I do support victims and I do support justice. "Noah" decided early on that he didn't believe the teen victim of a rape in Steubenville, Ohio was going to get justice.
As the New York Times itself admitted, traditional security technology such as firewalls and anti-virus were unable to stop recent cyber attacks. So how can organizations prevent such targeted cyber attacks? Following these four steps to cyber health is a good start.
Although the average computer user has little involvement with such significant security threats, the increasing prevalence of cybercrime places greater responsibility on consumers to protect their individual identities and personal information from hackers.
Like many activists before him, Aaron fell prey to a criminal justice system that entrenches the standing of the already powerful, and which has been used so many times to break unionists and stymie their organizing efforts.
Given the number of successful attacks we've seen in the past year, it's apparent that the security community is in need of a new approach. We can no longer afford to sit back and wait for attacks to hit our perimeter and hope that we can stop them -- that simply does not work.
For his latest subversive intervention, the self-described "contemporary artist and pirate" Paolo Cirio wants to give you the offshore tax benefits en...
As news of major breaches roll in like waves on a storm-eroded beach, the likelihood increases that the next war we fight will be waged on computers aimed at crippling the systems that keep the wheels of government and daily life turning.
Just a few hours before the State of the Union address, President Obama signed an executive order authorizing new policies to protect U.S. critical infrastructure cybersecurity. The call for additional legislation in this area acknowledges the need for continued vigilance.
What does "evidence of a major digital attack looming" look like? There are no convoys to see from a spy plane, no fleet heading sailing towards Hawaii. Without an idea of what this evidence is, the guidelines seem to justify preemptive attacks against just about anyone at any time.
When we're online, there are things we can control and things we can't. For example, we can control the passwords we use and what we say in social media. But sometimes we're victims of other people's carelessness or malice.
Sadly, even children as young as kindergarten are targeted by identity thieves now.
Computer users may be most vulnerable to a disturbing trend in hacking crimes in the comfort of their own homes. Follow these few steps to protect yourself and your loved ones from digital spying.