Subscribe
Modern field guide to security and privacy

Security Culture

This journalism empowers people to understand the bigger picture of cybersecurity as it connects to some of the most personal parts of their lives: their job, their education, the evolving digital culture around them, and the technology they use on a day-to-day basis. As part of the Monitor’s overarching commitment to chronicling human progress, we see these very human issues within cybersecurity to be critical and overlooked parts of the conversation.

This initiative is generously supported by

  • Northrop Grumman
  • ISC
  • Cybersecurity firms need millennials — here’s how they can change to attract top talent

    Professionals under 30 today will make up three quarters of the cybersecurity workforce by 2025 

  • What are the world’s information security professionals thinking about?

    Understanding the global information security workforce is a necessary first step to growing and building the field.

  • Hackers Hackers for good: A bug bounty hunter's path to America

    So-called 'bug bounty' programs, which pay ethical hackers anywhere in the world for reporting security flaws, are the ticket for one Indian security researcher to study in the US.

  • Privacy Privacy by design: How fashion combats surveillance

    Designers, artists, and students around the world are creating accessories and clothing meant to hide wearers' identities from mass surveillance.

  • Hackers Opinion: Why Washington needs more hackers

    The federal government is finally beginning to embrace hackers, but it should do more put their talents to work fixing the nation's cybersecurity. Their help is sorely needed.

  • Privacy Video: How to create a secure password, as told by a 12-year-old

    A young New Yorker started her own business to sell secure passwords. 

  • Security Can cybersecurity boot camps fill the workforce gap?

    A startup in Denver and an initiative in Chicago are using cybersecurity boot camps to quickly prepare workers to fend off digital attacks. 

  • Security How should 1 billion users respond to epic Yahoo hack?

    The scope of the breach is a harsh reminder how everyone on the web needs to be vigilant about protecting their data in an era of widespread criminal and government hacking.

  • Privacy When mom becomes Big Brother

    What are the tools and tricks of internet tracking in the home, and why building a domestic surveillance state is worth it for one family.

  • Security The legal exemption making life easier for ethical hackers

    An exemption to the Digital Millennium Copyright Act allows hackers to conduct good will research into medical devices, automobiles, and other internet-connected devices without threat of lawsuits from manufacturers. 

In Pictures Hacker style at DEF CON

DEF CON staffers, presenters, and contest winners also walk around with skull-shaped electronic badges that set them apart from other attendees. “Here, the more badges you have, the better you do socially,” Puddin said. “You don’t have to prove yourself by wearing a black T-shirt because you have the badges."

  • Security How to pick a password manager

    After the Yahoo breach exposed personal data about 500 million users, many people are looking for ways to protect themselves online. That's where password managers come in. 

  • Security Digital attack on journalist raises specter of online censorship

    After an unprecedented online assault took down cybersecurity journalist Brian Krebs's influential cybersecurity blog, he was able to return to the web because of a new service that protects journalists and activists from online censorship. 

  • Hackers The best way to learn about computers: break them

    Travis Goodspeed, an independent cybersecurity researcher, says tinkering leads to better cybersecurity.

  • Privacy When Alexa is listening, what do you tell houseguests?

    If you've plugged in an eavesdropping personal assistants such as the Amazon Echo Dot, are you obligated to warn visitors, 'Be careful what you say, Alexa is listening'?

  • Policy Obama plan to boost cybersecurity workforce fails to impress professionals

    Cybersecurity experts say a White House plan to bolster numbers of professionals working to safeguard federal networks doesn't go far enough. 

  • Security With the drama but not the bruises, hacking becomes a spectator sport

    DARPA staged the world's first live computer-versus-computer hacking competition in which teams battled for a multimillion dollar purse in front of thousands of cheering fans in Las Vegas.

  • Innovation Opinion: The value of talking to girls about technology

    To boost the number of women in technology, first we need to treat girls interested in tech as normal, and stop forcing them to make a false choice between girliness and geekdom.

  • Innovation High-stakes DARPA hacking contest pits computer against computer

    The Pentagon's research wing this week will stage an unprecedented digital battle in Las Vegas in which machines will attempt to autonomously find and fix computer security flaws. 

  • Security Meet David Dworken, the teenager who hacked the Pentagon

    The 18-year-old who just graduated high school was one of the youngest hackers participating in the Pentagon's bug bounty program to root out security flaws in military websites.

  • Security How to keep criminal hackers from ruining your vacation

    Following basic security measures, like leaving extra devices at home and avoiding public Wi-Fi, could be enough to protect your information while you're traveling.

Show More

Loading...