Most of today's computer languages make it hard for programmers to protect users' privacy and security. The fix is to take those tasks out of human hands entirely.
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
Governments, academic institutions and private companies are all spending millions of dollars. But the most effective solutions to the cybersecurity labor shortage will not be found individually.
The best way to protect a presidential device is to keep it off the internet altogether. If that's not going to happen, how else can such a sensitive gadget be kept safe?
Dulled by hearing the same old recommendations to improve internet security, we are worn out. It's time for a new approach, involving us all.
Government agencies and contractors are now less trusting of their workers, and keeping a much closer eye on them, both on and off the job.
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Cyber threats are universal. But the appropriate response may be quite different in academia from what works in the corporate world.
If we can change people's behaviour we won't be so at risk from cyber attacks.
Though there is no indication hackers affected the outcome of the election, we still must act to improve the cybersecurity of American elections.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Instead of relying on cyber insurance to protect businesses against the damages of attacks, executives should get to know the information they are protecting.
The recent cyber attack on the Dyn infrastructure shows why the internet of things poses a risk to us all.
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
While voter fraud - despite recent allegations - is rare, how do we ensure the ballots we cast are counted accurately? If so, how? Our experts offer background and insight.
The key factor to consider is not cooperation, but rather focus: One is an offensive military unit and the other a defensive civilian agency.
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.