As South American countries recover from a massive blackout, the US isn’t immune: The Northeast Blackout of 2003 cut power to 50 million people, and many threats to the electricity grid remain.
Power utilities’ cybersecurity practices may be effective, but need to evolve over time. And all companies operating elements of the grid – even the small ones – should step up.
As the microchip industry celebrates the 50th anniversary of chipmaker Intel’s founding, engineers and researchers call for a complete rethinking of computer architecture.
Russian government agents allegedly penetrated US state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
IAFEI and partners Duke University and Grenoble EM regularly survey CFOs across the world. For the second quarter 2018, the poll ran from May 13 to June 7, 2018.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Keith Martin, Royal Holloway University of London and Rory Hopcraft, Royal Holloway University of London
Cyber vulnerabilities in shipping show how far the industry has to go. But proper cyber security of ships is more complex than you might initially think.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
New research has uncovered a previously unknown weakness in smart city systems: devices that trust each other. That could lead to some pretty terrible traffic, among other problems.
Cyber deterrence is based on outdated ideas developed during the Cold War, but with cyber crime projected to hit US$6 trillion by 2021, cyber security requires new approaches.
As Amazon introduces a new smart-home device aimed at children, it’s important to know many internet-connected toys are not secure, putting kids’ security and privacy at risk.