New standards and regulations are beginning to govern how companies protect customers' data. Companies ignore this vital issue at their peril, both financially and legally.
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers' privacy?
It may sound like science fiction, but research shows that all you really need to develop brain biometrics is a set of earphones.
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
Russia could undermine the idea of a shared European reality and sway three elections key to the future of the bloc.
The power grid is increasingly computerized. That opens it to attacks and requires new defenses.
Most of today's computer languages make it hard for programmers to protect users' privacy and security. The fix is to take those tasks out of human hands entirely.
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
Governments, academic institutions and private companies are all spending millions of dollars. But the most effective solutions to the cybersecurity labor shortage will not be found individually.
The best way to protect a presidential device is to keep it off the internet altogether. If that's not going to happen, how else can such a sensitive gadget be kept safe?
Dulled by hearing the same old recommendations to improve internet security, we are worn out. It's time for a new approach, involving us all.
Government agencies and contractors are now less trusting of their workers, and keeping a much closer eye on them, both on and off the job.
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Cyber threats are universal. But the appropriate response may be quite different in academia from what works in the corporate world.
If we can change people's behaviour we won't be so at risk from cyber attacks.
Though there is no indication hackers affected the outcome of the election, we still must act to improve the cybersecurity of American elections.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.