Modern field guide to security and privacy


  • Passcode Voices Want to fix cybersecurity? Think about worst-case scenarios first

    Scenario thinking sketches out future cybersecurity problems and helps policymakers begin addressing tomorrow's digital dilemmas.

  • Passcode Voices How technology tramples on freedom

    Rapid advances in biometric technology mean the public is surveilled – and their movements recorded – more than ever before. If this technology spreads without limits, it could soon impinge on basic rights.

  • Passcode Voices A hacker's guide to fixing automotive cybersecurity

    The security researcher known for hacking a 2014 Jeep Cherokee, leading to a 1.4 million-vehicle recall, outlines how automakers can keep connected cars safe from cyberattacks.

  • How to improve your digital security

    Want to control your own digital security? There’s a wide array of options for secure messaging apps, email services and browsers that help you do-it-yourself.

  • Passcode Voices What it'll take to forge peace in cyberspace

    The international community has finally started a serious conversation about norms in cyberspace. But reaching a global consensus needs the world's attention.

  • Cybersecurity in seven minutes

    Essentials for protecting yourself online.

  • Event: Exploring the US-Israeli relationship in cyberspace

    On March 21 and 22, American University in Washington will host 'Cybersecurity in an Age of Uncertainty: US-Israel Perspectives,' a conference to explore the nations' collaborative efforts on military and civilian digital security.

  • Podcast: What to expect from Trump on cybersecurity

    On this extra episode of The Cybersecurity Podcast, Jack Detsch brings you the highlights from Beat the Breach, an event cohosted by Passcode and Invincea during the RSA Conference in San Francisco.

  • How US and Iraqi forces plan to stop Islamic State drones

    As the Islamic State begins deploying off-the-shelf drones to surveil or attack Iraqi and western forces, defense companies race to find a technical solution. 

  • Did WikiLeaks just unmask CIA cyberoperations?

    The antisecrecy site released a trove of alleged CIA hacking tools to break into iPhones, Android devices, and connected TV sets to carry out espionage operations.

  • White House tech vacancies may threaten cybersecurity advances

    President Trump has not replaced the federal chief information officer or chief information security officer, leaving gaps in key positions responsible for safeguarding and updating government systems.

  • Can parental spyware keep kids safe online?

    Some law enforcement officials say it won't – and are discouraging parents from relying on a growing number of smartphone surveillance apps to guard against bullying and sexual predators.

  • Obama officials: There's hope for cybersecurity under Trump

    At the Beat the Breach event during the RSA Conference in San Francisco this week, current and former US government officials expressed optimism about the state of cybersecurity under President Trump.

  • Passcode Voices Opinion: How to build public trust in our data-powered universe

    The weaponization of data at the micro level is a serious challenge. Don't let the era of Big Data give way to a future of Bad Data.

  • Video: What is a zero-day?

    Melanie Teplinsky, cybersecurity expert and adjunct professor at American University’s Washington College of Law, explains. 

  • The secret world of vulnerability hunters

    Spies, hackers, and cybersecurity firms compete to find and exploit software flaws, often to infiltrate criminal networks or track terrorists. A look into this complex ecosystem.

  • Trump's immigration order vastly expands border surveillance

    The Department of Homeland Security is rushing to roll out a multibillion dollar surveillance system that will equip US airports with facial recognition software.

  • Passcode Voices Opinion: How to have a FUD-free RSA Conference

    The key to a productive RSA Conference, the massive cybersecurity gathering that kicks off next week in San Francisco, is avoiding firms that push fear, uncertainty, and doubt.

  • Hunting for evidence, Secret Service unlocks phone data with force or finesse

    At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations.

  • Passcode Influencers Influencers: US should hit Russia harder for political hacks

    The US should retaliate more strongly against Russia for its digital attacks on American political organizations, more than three-quarters of Passcode’s Influencers said.

Load More
Save for later


Saved ( of items)

This item has been saved to read later from any device.
Access saved items through your user name at the top of the page.

View Saved Items


Failed to save

You reached the limit of 20 saved items.
Please visit following link to manage you saved items.

View Saved Items


Failed to save

You have already saved this item.

View Saved Items