Among the lessons from the Sony hack was that conventional cybersecurity measures don't always stop intruders. What more corporations need to apply is an active defense to better understand and stop future threats.
Kenya’s high-elevation forests are the source for most of its water. A new conservation strategy of working with local communities is showing signs of success.
Avijit Roy, who wrote about religion, was murdered on a Dhaka street yesterday. Attacks on free expression are an almost daily occurrence in some parts of the world.
The Miracle Foundation dramatically improves standards in a growing network of orphanages.
The destruction of ancient Iraqi artifacts – a tactic employed in cultural genocide – is part of the Islamic State militants' efforts to reform the region into a single, homogenous Muslim caliphate under its control.
There are good reasons to be skeptical about the claims made by supporters of the militant who has now been identified as Mohammed Emwazi.
The Pentagon's advanced research arm revealed its latest version of Plan X, an in-progress system designed for the military to visualize defending against cyberattacks, at a Passcode event on the future of cybersecurity innovation.
Today, we suffer from two key challenges in addressing cyber security threats: (1) an over-abundance of endless data, and (2) a small pool of highly skilled cyber security personnel.
Today, as a nation, we are plagued by attacks from cyber criminals who range from ideologically motivated individuals and groups to well-financed nation-state bad actors. They seek to disrupt our commerce, steal our money and assets and create uncertainty that we have only seen previously in the physical world.