Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys.
Shutterstock
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here’s how you can protect yourself.
Even the best players in the world will have to be wary of cyber threats.
EPA/ Ennio Leanza
Cyber deterrence is based on outdated ideas developed during the Cold War, but with cyber crime projected to hit US$6 trillion by 2021, cyber security requires new approaches.
Numerous cyber attacks in recent years have targeted common household devices, such as routers.
Shutterstock
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
A new report finds concerns about water infrastructure tops the list for Canada’s water providers.
(Shutterstock)
A delicate truce between North and South Korea has been reached in the run up to the Winter Olympics. It’s a high profile win for an event which is struggling to remain relevant.
Cyber attacks have the potential to cause economic disruption, coerce changes in political behaviour and subvert systems of governance.
from www.shutterstock.com
Cyber security has dominated international affairs in 2017, with the US election hack as one of the main stories. The ongoing investigation shows that cyber attacks can subvert systems of governance.
Modern advances come with new liabilities.
Sergey Nivens/Shutterstock.com
Biologists’ growing reliance on computers advances the field – but comes with new risks. The first step toward improved cyberbiosecurity is increasing awareness of possible threats.
We want your data.
gualtiero boffi / Shutterstock.com
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
Reports of North Korea’s capability of firing nuclear weapons are not the only serious threat to global security. North Korea has also become an aggressive cyber power.