Dan Coats says the danger signs are as serious as warnings before 9/11.
Nakasone replaces Admiral Mike Rogers, who is retiring after nearly four years in the “dual-hat” position leading the NSA and the military’s cyber warfare division.
The Kremlin's new playbook includes provocations that do not explicitly come under the provisions of what constitutes an
What if someone infiltrated our nuclear command and control so that if we pushed the button, nothing happened? Or if something did happen even without our pushing the button? What if Pakistan did this to India, or India to Pakistan?
Walls defended cities for millennia against attacks from invading armies. Their worth was proven time and again. It was safer
As the Internet spreads its tentacles into every nook of society, attacks are rapidly increasing against individuals, companies, governments, and the very Net infrastructure upon which they all rely. The attackers range from cyber criminals to non-state actors like ISIS and nation-states. But law enforcement, government regulation, and military response are not keeping up.
In the future, what countries do with digital weapons may be more destructive than boots on the ground or drones in the sky.
The competitions designed by XPRIZE touch the furthest reaches of human achievement in fields like health care, oceanography and space exploration. We are currently designing a prize competition in the field of cybersecurity.
In this three-part video series, you'll hear from some of the giants in the Internet and cyber security fields as they relate stories of cybercrime becoming a worldwide business, privacy becoming an antiquated idea, the discovery of Stuxnet and the real possibility of cyber warfare.
CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.
Quantum computers are already here in a limited form, and fully functional versions are on the way. They will be as transformative for mankind as were the mainframe computers, personal computers, and smartphones that we all use. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.
If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.
The President will discuss cybersecurity as part of the State of the Union address. He wants "companies to share threat information with homeland security" in exchange for “targeted liability protection.” What does this mean for Americans?
Does hacking into a private entertainment corporation's computer files constitute an act of war? Against whom, exactly?
Not long after the uprising in Syria turned bloody late in the spring of 2011, the Pentagon and the National Security Agency
The title of Ron Deibert's is a bit of a recycling job. He first used "Black Code" as the title of a 2002 article, then "Black
Deibert's Citizen Lab, based at the University of Toronto, tries to shed light on this increasingly complex shadow world
"It's about how we tell the narrative from the beginning, so that we're not setting people up to think we're going to win
Though autonomous, destructive robots are a long-time, hackneyed science fiction plot, for some time, this new kind of warfare has been shifting from yesterday's movie to today's reality.
It also does not conclude where to draw the line in terms of when a hacker becomes fair game. "The law is unclear as to the