Business executives need to pay more attention to the information they are protecting.
Instead of relying on cyber insurance to protect businesses against the damages of attacks, executives should get to know the information they are protecting.
The recent cyber attack on the Dyn infrastructure shows why the internet of things poses a risk to us all.
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
How secure is your vote?
Hands with votes illustration via shutterstock.com
While voter fraud - despite recent allegations - is rare, how do we ensure the ballots we cast are counted accurately? If so, how? Our experts offer background and insight.
Should one person lead two different government agencies?
U.S. government images
The key factor to consider is not cooperation, but rather focus: One is an offensive military unit and the other a defensive civilian agency.
Need you announce you’ve been hacked? The clock is ticking.
Woman with clock and megaphone via shutterstock.com
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
Russia is pressing its national interests online.
Flags and keyboard via shutterstock.com
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.
Is a Great British Firewall what UK plc perhaps needs? Or is it asking for trouble?
Having a nationwide firewall means trusting the same people who spy on communications.
What can ‘Snowden’ teach us about cybersecurity?
Jürgen Olczyk/Open Road Films
The new movie about the NSA leaker is a new way for the public to learn about government surveillance, communications technology and privacy. How well does it prepare the public for that discussion?
Teams collaborate to attack each other’s systems, and simultaneously defend their own.
By 2020, the cybersecurity industry will need 1.5 million more workers than will be qualified for jobs. What's the solution? Getting high school and college students excited about the industry.
Seeking a peaceful handover of power between parties and political opponents.
It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
Cybersecurity risks increase with the amount of outsourcing a company does.
Business Briefing: hack-proof, how business can stay ahead in cybersecurity.
The Conversation 15.3 MB (download)
Businesses are going about cybersecurity the wrong way and need to go back to the question: what are you trying to protect?
China may be undertaking more cyber attacks than the Australian government has admitted.
It's no surprise that China represents a cyber threat to Australia. But the government has been reluctant to state this fact and needs to respond more decisively.
Russia is flexing its cyberattack muscles.
Glove with Russian-flag keyboard via shutterstock.com
What do we know about Russia's cyber strategy, capabilities, and intentions? This top-notch adversary is more advanced and stealthier than any other.
PHOTOCREO Michal Bednarek/Shutterstock.com
A sufficiently talented brainjacker could one day influence the behaviour of a person in worrying ways.
Cybersecurity just got even more difficult.
The top cyberspy agency couldn't stay immune from attacks forever. What does it mean for governments, companies and internet users as a whole that the NSA has been hacked?
Is everything on the up-and-up here?
With the DNC email leak and Trump calling on Russia to hack Clinton's emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
It’s a cat and mouse game that could put our online privacy and security at risk.
As governments look to new ways to step up surveillance, hackers find new ways to subvert it. Is there a way to end this cat and mouse game, described as a crypto-war?
Are online black markets this direct?
Hands exchanging money via shutterstock.com
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
What if robots turn against us?
Robot and skull via shutterstock.com
The threat from dangerous AI systems is vastly underappreciated and under-researched. If we don't study them, we can't fight them – or prevent them.