Menu Close

Artikel-artikel mengenai Cybersecurity

Menampilkan 21 - 40 dari 371 artikel

Women bring a much-needed change in perspective to cybersecurity. Maskot/Maskot via Getty Images

The lack of women in cybersecurity leaves the online world at greater risk

Women are underrepresented in technology fields, but especially so in cybersecurity. It's not just a matter of fairness. Women are better than men at key aspects of keeping the internet safe.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard. U.S. Air Force photo by J.M. Eddins Jr.

Government cybersecurity commission calls for international cooperation, resilience and retaliation

In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it's time to change that.
Apps that warn about close contact with COVID-19 cases are key to relaxing social distancing rules. Walter Bibikow/Stone via Getty Images

How Apple and Google will let your phone warn you if you’ve been exposed to the coronavirus

Bluetooth wireless communication makes it possible for people to get alerts on their phones when they've been exposed to the coronavirus. Adding the right cryptography scheme keeps those alerts private.
The proliferation of smart devices including healthcare devices means the health system is vulnerable to cyber attacks. The Conversation US | Motion Array

Video: The coronavirus pandemic lays bare a host of cyber issues

The coronavirus pandemic lays bare the many vulnerabilities created by society’s dependence on the internet. Watch the video to learn more about these issues.
The pandemic is increasing society’s reliance on digital connections. MR.Cole_Photographer/Moment via Getty Images

Society’s dependence on the internet: 5 cyber issues the coronavirus lays bare

Much of the world is moving online in response to the coronavirus pandemic. Society's newly increased dependence on the internet is bringing the need for good cyber policy into sharp relief.
Elements of smart homes, including thermostats, may be vulnerable to hackers. Ann Hermes/The Christian Science Monitor via Getty Images

‘Internet of things’ could be an unseen threat to elections

Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
A U.S. Census Bureau staff member uses digital maps to help identify where people live and need to be counted. U.S. Census Bureau via AP

The census goes digital – 3 things to know

Collecting census data online creates new risks to the accuracy and integrity of the information. Here's what to be aware of.
Two CubeSats, part of a constellation built and operated by Planet Labs Inc. to take images of Earth, were launched from the International Space Station on May 17, 2016. NASA

Hackers could shut down satellites – or turn them into weapons

SpaceX and other companies are rushing to put thousands of small, inexpensive satellites in orbit, but pressure to keep costs low and a lack of regulation leave those satellites vulnerable to hackers.
Seven hackers tied to the Iranian government were indicted for attempting to take over a New York dam’s control system. Alex Wong/Getty Images

How Iran’s military outsources its cyberthreat forces

The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.
Who is responsible for protecting consumer data? Data breaches are now a regular occurrence, and governments are stepping in. (Shutterstock)

Growth in data breaches shows need for government regulations

Failure of corporations to protect data means that government regulation is required to ensure corporation compliance.
What digital border controls should be used in Russia? Wikimedia

‘Digital sovereignty’: can Russia cut off its Internet from the rest of the world?

The Russian government would like to free itself from the global Internet. This push for “digital sovereignty” has raised technical scepticism and political concerns.

Kontributor teratas

Lebih banyak