A vigilant public is a necessary component in our collective security strategy against cyber attacks.
The rate at which valuable identity information is flying out of the control of firms is alarming -- more than 3,500 records per minute.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
The way we talk about cyberspace may make us more vulnerable to hacking.
Cars are effectively becoming computers on wheels – and very attractive to cyber criminals.
Reports of North Korea's capability of firing nuclear weapons are not the only serious threat to global security. North Korea has also become an aggressive cyber power.
Confidential data and even human lives are at risk thanks to the huge spread of connected technology in healthcare.
Small businesses are the forgotten casualties of the recent WannaCry ransomware attack.
NHS data is being held to ransom by criminals. This the mother of all wake-up calls.
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
A way in for government would also allow hackers access.
Using sound waves to disrupt sensor functions is just one of a growing number of "side-channel attacks" that could affect our devices.
You know it's a serious problem when even Google and Paypal have been targeted.
The latest WikiLeaks revelation shows how far the CIA can take its cyber attacks.
Russia could undermine the idea of a shared European reality and sway three elections key to the future of the bloc.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
The power grid is increasingly computerized. That opens it to attacks and requires new defenses.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
If we can change people's behaviour we won't be so at risk from cyber attacks.