iOS app Android app

Cyber Attacks

Something's Wrong With Home Depot's Explanation of the Hack

Rebecca Abrahams | Posted 09.10.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystems Something is wrong with Home Depot's explanation of the hack on the point of their cas...

Gerry Smith

Former NSA Chief Is Working For Wall Street Now | Gerry Smith | Posted 07.09.2014 | Technology

Wall Street has tapped former National Security Agency director Keith Alexander to form a council that would coordinate how banks and the government r...

Toward a Positive Cyber Peace

Scott J. Shackelford | Posted 08.23.2014 | Technology
Scott J. Shackelford

Defining and fostering cyber peace is no easy feat; in fact, it has been said that "achieving and maintaining cyber-peace can be as demanding as starting a cyberwar."

The Admiral Sets A Good Course

Brian E. Finch | Posted 08.20.2014 | Politics
Brian E. Finch

If an enemy army or air fleet is clearly on its way to attack targets in the United States, the military has a plan to respond. It has assets deployed domestically and overseas to intercept such attacks, and has tactics and strategies in place to respond to such aggressive maneuvers.

Reexamining Article 5: NATO's Collective Defense in Times of Cyber Threats

Klara Tothova Jordan | Posted 08.13.2014 | World
Klara Tothova Jordan

NATO must move past its current cyber defense policy and provide operational capabilities to defend itself and its allies by collective preemptive and retaliatory actions.

Five Essential Tips for Small Business Data Security

Guy Chiarello | Posted 05.13.2014 | Small Business
Guy Chiarello

While marketing and promotion strategies can accomplish the first two, are small businesses really doing enough to protect their customers' data and reassure them that their personal information is safe?

Cybercrime's First CEO Casualty: Avoidable Error

Harlan Loeb | Posted 07.06.2014 | Business
Harlan Loeb

In the earliest days of the breach, Target began circulating data on the number of customers impacted. Subsequently, though, it continually revised the number upward to the point that everyone stopped paying attention.

Why Ignoring the NIST Framework Could Cost You

Scott J. Shackelford | Posted 07.02.2014 | Technology
Scott J. Shackelford

As courts begin to shape a cybersecurity duty of care in this "new era," the NIST Framework could be used to determine whether a company's duty has been successfully met.

The Danger Signs Are Adding Up

Brian E. Finch | Posted 06.08.2014 | Technology
Brian E. Finch

Namely warnings about cyber threats are growing more specific, and the language being used to urge action is growing more aggressive. Taken together, one starts to see a very interesting picture develop.

First Public NSA Speech: "De-Militarization" of Cyber Space

Brian E. Finch | Posted 06.04.2014 | Technology
Brian E. Finch

Our efforts are likely better focused on drawing laws of cyber war, as well as making it clear that use of cyber weapons to attack America will be met with a digital and physical response as appropriate.

What's Wrong With America's Cyber Security Policy?

Rebecca Abrahams | Posted 05.31.2014 | Technology
Rebecca Abrahams

The U.S. has spent billions on cyber security, yet the problem is worsening. America's political leaders worry about a cyber "Pearl Harbor." Secretary of Defense Hagel, in his first major speech on the subject, is promising to triple the staff working to combat cyber terrorism. But will it work?

Here Comes the Cyber Chill?

Brian E. Finch | Posted 05.27.2014 | Technology
Brian E. Finch

Disturbing news from the legal world this week, as cybersecurity vendor Trustwave was sued because it allegedly "failed to live up to its promises or ...

Contracting Cybersecurity Efforts: Who Is Responsible?

Brian E. Finch | Posted 05.12.2014 | Technology
Brian E. Finch

Siobhan Gorman penned an excellent article in Friday's The Wall Street Journal, discussing how alleged contracting omissions led to a successful cyber...

Why 'Beating' a Russian Cyber Assault on Ukraine Is Trickier Than You Might Think

Heather Roff | Posted 05.04.2014 | Politics
Heather Roff

There are reports that Russian troops are using jamming equipment to disrupt communication between Ukraine forces, and that Russian troops allegedly cut Internet cables inside Crimea.

Intensifying Cyber Threats

Jonathan Zittrain | Posted 03.24.2014 | Impact
Jonathan Zittrain

Perceived digital warfare is escalating as a sophisticated breed of attack against corporations, governments and individuals.

Cybersecurity Industry Interview With Marsh's Matt McCabe: Part One

Brian E. Finch | Posted 03.10.2014 | Technology
Brian E. Finch

Specifically, in this interview, we delve issues concerning the cybersecurity insurance market, explaining risks, policies and costs.

Designing Degrees for Digital Gatekeepers

Edward Guiliano, Ph.D. | Posted 01.25.2014 | College
Edward Guiliano, Ph.D.

In this environment, enter universities that are designing degrees, creating knowledge, framing debates, and developing solutions about pressing issues (before, during, and after they become problems). Take cyber security.

3 Major Database Companies Hacked

Reuters | Jim Finkle | Posted 11.25.2013 | Technology

BOSTON (Reuters) - Three major U.S. data providers said on Wednesday they were victims of cyber attacks, after a cybersecurity news website linked the...

Is Anything Safe Online?

Michael Gregg | Posted 11.16.2013 | Technology
Michael Gregg

The reality is, there's never been any such thing as online privacy. Just because the website you're on has a lock symbol in the address bar, doesn't mean it's 100 percent safe. Here are four ways you didn't know you could get hacked.

12 Years After 9/11: Understanding the Threats We Face and How Far We Have Come

Sen. Jay Rockefeller | Posted 11.13.2013 | Technology
Sen. Jay Rockefeller

Every year on September 11, we mourn the nearly 3,000 people who lost their lives that tragic day. We honor the firefighters, police officers and first responders who risked and gave their lives to save so many others.

The Urban Myth About Car Thieves That's True

Hemanshu Nigam | Posted 10.18.2013 | Crime
Hemanshu Nigam

According to authorities around the world, however, this disturbing trend in digital crime represents a sobering reality for owners of vehicles with keyless entry systems.

The Internet Knows More About You Than You Think (INFOGRAPHIC)

Posted 10.18.2013 | Entertainment

Paranoid about your online footprint? You should be. It's easier than ever for cyber thieves to access your personal data, and something as simple and...

Cyber Terror Is the New Language of War

Sen. Byron Dorgan | Posted 09.16.2013 | Politics
Sen. Byron Dorgan

How dangerous could these cyber attacks be? Consider what might happen if our water supply, our electric grid, or the Internet was successfully shut down by a cyber attack.

PRISM: An International Relations Disaster?

Matthew Dunn | Posted 09.09.2013 | Politics
Matthew Dunn

For all the rhetoric coming out of China, Russia, parts of Europe, and elsewhere, PRISM isn't an international relations disaster. Sadly, the real "disaster" was incremental and happened over years, culminating in a break down in trust before the PRISM revelations.

Cyber Warfare: What Are the Rules?

Daniel Garrie | Posted 06.17.2013 | World
Daniel Garrie

With the advent of cyber warfare the complexity of what is war is even more clouded and the application of law to this is even murkier.