Russian government agents allegedly penetrated US state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
IAFEI and partners Duke University and Grenoble EM regularly survey CFOs across the world. For the second quarter 2018, the poll ran from May 13 to June 7, 2018.
Ten years after the publication of two major works about violence, their authors meet to discuss their theories and renew the debate.
Cyber vulnerabilities in shipping show how far the industry has to go. But proper cyber security of ships is more complex than you might initially think.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
New research has uncovered a previously unknown weakness in smart city systems: devices that trust each other. That could lead to some pretty terrible traffic, among other problems.
As more physical objects are becoming digitalised, it is leading to greater national security risks.
Framing cyberspace as a national security concern can quickly erode fundamental human rights.
As Amazon introduces a new smart-home device aimed at children, it's important to know many internet-connected toys are not secure, putting kids' security and privacy at risk.
Here's how to secure your home network, whether or not it has already been attacked by hackers.
Local governments don't pay much attention to cybersecurity, leaving them vulnerable to hijacking as happened to Atlanta and Baltimore.
In a complex environment with massive numbers of internet-connected devices, the key barrier to better cybersecurity isn't funding: It's ensuring staff at all levels take action against the threat.
With countries such as China and Sweden are studying plans to create a new form of money – a central-bank digital currency. CBDCs risk revolutionizing both the way money is created and distributed.
The best way to protect elections is to plan and prepare for an audit of the results after the votes are cast.
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Theresa May says Britain could unleash 'extensive measures' against Russia following the nerve agent poisoning of ex-spy Sergei Skripal.
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Smartphones are key elements of two-factor authentication processes. Weakening their security threatens people's digital identities.