Menu Close

Articles on Cybersecurity

Displaying 1 - 20 of 589 articles

A vulnerability in Log4j, a humble but widespread piece of software, has put millions of computers at risk. SOPA Images/LightRocket via Getty Images

What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what’s at stake

Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities. AP Photo/Jerome Delay

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off. WhataWin/iStock via Getty Images

How vulnerable is your personal information? 4 essential reads

Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
The $1 trillion bill was a heavy lift for Speaker Nancy Pelosi (center). Next up: the budget reconciliation bill known as Build Back Better. Anna Moneymaker/Getty Images

Congress passes $1T infrastructure bill – but how does the government go about spending that much money?

The government uses a process called public procurement. A professor of public policy explains how the process works and how it is increasingly used to achieve social goals.

Top contributors

More