IAFEI and partners Duke University and Grenoble EM regularly survey CFOs across the world. For the second quarter 2018, the poll ran from May 13 to June 7, 2018.
Iraqi Army soldiers South of Mosul in November 2016.
Mstyslav Chernov/Wikimedia
Cyber vulnerabilities in shipping show how far the industry has to go. But proper cyber security of ships is more complex than you might initially think.
Despite its enormous cost, the metadata retention scheme wasn’t future-proof.
Shutterstock
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
What algorithm turned these lights red?
monticello/Shutterstock.com
New research has uncovered a previously unknown weakness in smart city systems: devices that trust each other. That could lead to some pretty terrible traffic, among other problems.
Poorly secured IoT devices could lead to attacks on national security.
flickr/electroluxdesignlab
As Amazon introduces a new smart-home device aimed at children, it's important to know many internet-connected toys are not secure, putting kids' security and privacy at risk.
Securing your home’s connection to the internet.
rommma/Shutterstock.com
Donald Norris, University of Maryland, Baltimore County; Anupam Joshi, University of Maryland, Baltimore County; Laura Mateczun, University of Maryland, Baltimore County, dan Tim Finin, University of Maryland, Baltimore County
Local governments don't pay much attention to cybersecurity, leaving them vulnerable to hijacking as happened to Atlanta and Baltimore.
Is this device safe for use in a hospital?
Guitar photographer/Shutterstock.com
In a complex environment with massive numbers of internet-connected devices, the key barrier to better cybersecurity isn't funding: It's ensuring staff at all levels take action against the threat.
Sweden is studying the possibility of an “e-krona”, an electronic form of the country’s currency.
Shutterstock
With countries such as China and Sweden are studying plans to create a new form of money – a central-bank digital currency. CBDCs risk revolutionizing both the way money is created and distributed.
Recounting very close races is not enough to ensure election integrity.
AP Photo/Ben Finley
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
What’s the best way to secure a world of connected objects?
Wilgengebroed
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
A smartphone is a digital form of ID for many apps and services.
Iowa Department of Transportation