Scenario thinking sketches out future cybersecurity problems and helps policymakers begin addressing tomorrow's digital dilemmas.
Regulators and utility industry leaders need to wake up to the risks that could let malicious hackers cause widespread physical damage to the grid and other critical infrastructure.
The more than 30-year-old Computer Fraud and Abuse Act carries overly harsh penalties for trivial digital transgressions – and it needs to be completely overhauled (or abolished altogether).
The Baltic nation has long had an adversarial relationship with its Russian neighbor. As a result, its press and public have become adept at recognizing and debunking Kremlin propaganda.
The Christian Science Monitor's Passcode traveled across the country to meet these hacker kids who are hunting software bugs, protecting school networks, and helping to safeguard electrical grids.
Rapid advances in biometric technology mean the public is surveilled – and their movements recorded – more than ever before. If this technology spreads without limits, it could soon impinge on basic rights.
The security researcher known for hacking a 2014 Jeep Cherokee, leading to a 1.4 million-vehicle recall, outlines how automakers can keep connected cars safe from cyberattacks.
The US government keeps some security flaws for itself. We take a look inside the secretive process to decide which ones to keep - and which ones to reveal to tech companies.
Want to control your own digital security? There’s a wide array of options for secure messaging apps, email services and browsers that help you do-it-yourself.
The US and China have made progress on curbing commercial cyberespionage. Now, the global powers need to set limits when it comes to digital warfare.
The international community has finally started a serious conversation about norms in cyberspace. But reaching a global consensus needs the world's attention.
Essentials for protecting yourself online.
On March 21 and 22, American University in Washington will host 'Cybersecurity in an Age of Uncertainty: US-Israel Perspectives,' a conference to explore the nations' collaborative efforts on military and civilian digital security.
On this extra episode of The Cybersecurity Podcast, Jack Detsch brings you the highlights from Beat the Breach, an event cohosted by Passcode and Invincea during the RSA Conference in San Francisco.
In virtual and physical stores, retailers are tracking customers' buying habits, biometric information, and personal preferences. And few consumers even know they are being watched.