Modern field guide to security and privacy
  • Hackers 15 under 15: Rising stars in cybersecurity

    The Christian Science Monitor's Passcode traveled across the country to meet these hacker kids who are hunting software bugs, protecting school networks, and helping to safeguard electrical grids.

  • Passcode Voices How technology tramples on freedom

    Rapid advances in biometric technology mean the public is surveilled – and their movements recorded – more than ever before. If this technology spreads without limits, it could soon impinge on basic rights.

  • Passcode Voices A hacker's guide to fixing automotive cybersecurity

    The security researcher known for hacking a 2014 Jeep Cherokee, leading to a 1.4 million-vehicle recall, outlines how automakers can keep connected cars safe from cyberattacks.

  • Policy How Washington evaluates software vulnerabilities

    The US government keeps some security flaws for itself. We take a look inside the secretive process to decide which ones to keep - and which ones to reveal to tech companies.

  • Passcode signs off

    The Monitor’s cybersecurity and privacy project ends March 31.

  • The Cybersecurity Podcast

    Passcode and New America have a podcast featuring the leaders and thinkers of cybersecurity.

  • Security How to improve your digital security

    Want to control your own digital security? There’s a wide array of options for secure messaging apps, email services and browsers that help you do-it-yourself.

  • How to teach people to be more digitally secure right when they need it most

    By giving employees cybersecurity training right when they’ve done a risky behavior, Wombat Security can help make real changes in user behavior.

  • Passcode Voices How China is preparing for cyberwar

    The US and China have made progress on curbing commercial cyberespionage. Now, the global powers need to set limits when it comes to digital warfare. 

  • Passcode Voices What it'll take to forge peace in cyberspace

    The international community has finally started a serious conversation about norms in cyberspace. But reaching a global consensus needs the world's attention.

How well do you know hacker movies?

Can you hack a Gibson? Are you interested in SETEC Astronomy? Shall we play a game? 

  • Security Cybersecurity in seven minutes

    Essentials for protecting yourself online.

  • Security Event: Exploring the US-Israeli relationship in cyberspace

    On March 21 and 22, American University in Washington will host 'Cybersecurity in an Age of Uncertainty: US-Israel Perspectives,' a conference to explore the nations' collaborative efforts on military and civilian digital security.

  • Have a website? Get started on securing it.

    SSL certificates make web transactions safer, enhance trust with customers, and boost search engine rankings.

  • Security Podcast: What to expect from Trump on cybersecurity

    On this extra episode of The Cybersecurity Podcast, Jack Detsch brings you the highlights from Beat the Breach, an event cohosted by Passcode and Invincea during the RSA Conference in San Francisco.

  • Passcode Voices You'll never shop alone again

    In virtual and physical stores, retailers are tracking customers' buying habits, biometric information, and personal preferences. And few consumers even know they are being watched.

  • Cybersecurity firms need millennials — here’s how they can change to attract top talent

    Professionals under 30 today will make up three quarters of the cybersecurity workforce by 2025 

  • Innovation How US and Iraqi forces plan to stop Islamic State drones

    As the Islamic State begins deploying off-the-shelf drones to surveil or attack Iraqi and western forces, defense companies race to find a technical solution. 

  • Is privacy a product or a right?

    In a world where our most intimate thoughts are exposed and catalogued on the Internet, citizens shouldn’t have to pay up for their privacy to be protected

  • How Homeland Security plans to end the scourge of DDoS attacks

    The agency is working on a multimillion dollar effort to protect the country's most critical systems from distributed denial of service attacks, which are among the simplest digital assaults to carry out and the toughest to fight.

  • Passcode Voices Opinion: It's time for us geeks to stand up and be heard

    Too often computer scientists are left out of public debates about computer science.

Load More


Save for later


Saved ( of items)

This item has been saved to read later from any device.
Access saved items through your user name at the top of the page.

View Saved Items


Failed to save

You reached the limit of 20 saved items.
Please visit following link to manage you saved items.

View Saved Items


Failed to save

You have already saved this item.

View Saved Items