As cyber warfare escalates, questions arise over war exclusions in insurance policies.
It's worth asking whether the software industry is more focused on cost and style than safety/security.
CISOs and CIOs, this is your big your chance. Seize it.
Ripple Protocol is a computer-based payment system that allows users to exchange fiat currency, digital currency, and other units of value across all borders.
As a replacement is chosen for outgoing Defense Secretary Chuck Hagel, some important questions should be asked of the nominee to replace him.
Some new words and phrases that capture some of what is going on in the world of cybersecurity.
'Information sharing mania' blinds us to the need to inflict pain on the attackers so they think twice about committing misdeeds.
Industry experts warn that demand for cybersecurity professionals far exceeds supply. The NSA is looking to right that disparity with an academic program that molds millennials into cyber talent.
A lack of panic over every new data breach is a sign that we are finally starting to view breaches in the proper context.
If you don’t know anything about the Bitcoin market, know this: you can use the digital currency as a form of payment on sites like Overstock.com, Amazon, and even Victoria’s Secret.
There are major risks associated with your various devices when traveling, but there are also some simple key steps that you must take to keep your data safe.
Careful analysis is needed to determine whether cyber-focused bills will actually help defend the country from digital threats.
Hackers and scammers know that travelers are in a hurry and might not be paying much attention to the security of Wi-Fi. And unbeknownst to travelers, they may have unwittingly connected to an unverified rogue network.
Cyber threats are constantly bombarding companies’ defenses—so it’s imperative you have the best lines of defense.
No material impact is being made on the volume of cyberattacks. In fact, recent estimates indicate that 97% plus of companies have suffered some form of serious cyber intrusion, and that it takes on average anywhere between 7 and 8 months to discover that an attack has occurred.
How can it be in today's environment where the government is maintaining email and cell phone data on every US citizen, that it can selectively lose emails from a single hard drive of a government official that is under investigation?
Growing up, the sacred text in our house was Consumer Reports, a/k/a “Consumers”. Nary a television, home appliance, or automobile could be purchased without consulting the infallible guide to what was worth some hard earned dollars.
The less information you disclose, the fewer points of access predators/collectors have to breach your personal or business life.
Poland, Estonia, Latvia, and Lithuania cannot look back with much comfort on the promise of Western assistance in the face of military aggression.
The FTC—for now—has wide latitude to assert that companies failing to provide “reasonable and appropriate data security” can have claims brought against them for unfair or deceptive practices.