Austraia’s first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
Law enforcement agencies can force access to your encrypted systems.
Flickr/Kārlis Dambrāns
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
Cybersecurity professionals are often portrayed as lone hackers in hoodies. But as well as technical skills, they also need to be excellent communicators and have a high degree of personal integrity.
Emmanuel Macron called for support for “open, secure, stable, accessible and peaceful cyberspace”.
Wikipedia
Richard Forno, University of Maryland, Baltimore County
Protecting democracy requires more than just technical solutions. It includes education, critical thinking and members of society working together to agree on problems and find solutions.
The online voting glitches in Ontario’s recent municipal elections show it’s time to develop nationwide guidelines and standards for online voting in Canada.
(Shutterstock)
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
A test subject entering a brain password.
Wenyao Xu, et al.
Biometrics are more secure than passwords – but when they’re compromised fingerprints and retina scans are hard to reset. Brain responses to specific stimuli are as secure and, crucially, resettable.
Apple has removed several security tools from the Mac app store after they were found to be collecting unnecessary personal data.
Shutterstock
Before you download antivirus and ad-blocker apps, do your due diligence on what personal information they want to access. Here are some tips on what to look out for.
An e-ballot is less secure than one on paper.
SvetaZi/Shutterstock.com
Ari Juels, Cornell University; Ittay Eyal, Technion - Israel Institute of Technology, and Oded Naor, Technion - Israel Institute of Technology
The stability and integrity of democratic society are too important to be relegated to inherently flawed computer systems that are vulnerable to malfunctions and malicious attacks.
Minuscule computer hardware could be spying on top tech firms.
graphicINmotion/ shutterstock
The UK has become surprisingly willing to brief the press about possible use of cyber attacks, including against Russia in response to the Skripal attack.
Where’s the next threat coming from? Whack it!
from www.shutterstock.com
As a resource-driven economy, Australia is not used to being at the pointy end of supply chains – and it feels as though we are managing risks and benefits of critical infrastructure on the fly.
The Achilles’ heel of law technologies: training. Only 10% of such initiatives are aimed at law students, so how should this issue be managed to win the AI race?