Women bring a much-needed change in perspective to cybersecurity.
Maskot/Maskot via Getty Images
Women are underrepresented in technology fields, but especially so in cybersecurity. It's not just a matter of fairness. Women are better than men at key aspects of keeping the internet safe.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it's time to change that.
Apps that warn about close contact with COVID-19 cases are key to relaxing social distancing rules.
Walter Bibikow/Stone via Getty Images
Bluetooth wireless communication makes it possible for people to get alerts on their phones when they've been exposed to the coronavirus. Adding the right cryptography scheme keeps those alerts private.
Face to face, virtually.
SammyVision/Moment via Getty Images
Zoom's privacy and security shortcomings are just the latest videoconferencing vulnerabilities. Knowing each platform's risks can help people avoid many of the downsides of virtual gatherings.
Shelter-in-place directives mean that more and more people are working remotely from home, producing more technological vulnerabilities.
With so many people working from home on vulnerable networks and set-ups, cybersecurity is a growing concern.
The proliferation of smart devices including healthcare devices means the health system is vulnerable to cyber attacks.
The Conversation US | Motion Array
The coronavirus pandemic lays bare the many vulnerabilities created by society’s dependence on the internet. Watch the video to learn more about these issues.
Emails offering advice about COVID-19 might actually be "phishing" attacks trying to steal your data.
The pandemic is increasing society’s reliance on digital connections.
MR.Cole_Photographer/Moment via Getty Images
Much of the world is moving online in response to the coronavirus pandemic. Society's newly increased dependence on the internet is bringing the need for good cyber policy into sharp relief.
The MyGov website ground to a halt this week as thousands of people tried to access welfare support. As a result, long queues popped up at Centrelink offices across the country.
it’s never good to find your data locked up.
PR Image Factory/Shutterstock.com
Police experience in crisis and hostage negotiation could come in handy when dealing with cybercriminals who have, effectively, kidnapped data.
Instead of going after large corporate networks, which often have multiple defenses, cybercriminals can now simply target people's home networks.
Elements of smart homes, including thermostats, may be vulnerable to hackers.
Ann Hermes/The Christian Science Monitor via Getty Images
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
A U.S. Census Bureau staff member uses digital maps to help identify where people live and need to be counted.
U.S. Census Bureau via AP
Collecting census data online creates new risks to the accuracy and integrity of the information. Here's what to be aware of.
Cyber security firms have sparked a revolution similar to the spread of private police forces.
Two CubeSats, part of a constellation built and operated by Planet Labs Inc. to take images of Earth, were launched from the International Space Station on May 17, 2016.
SpaceX and other companies are rushing to put thousands of small, inexpensive satellites in orbit, but pressure to keep costs low and a lack of regulation leave those satellites vulnerable to hackers.
Are these people’s votes accurately recorded and properly counted?
Bill Clark/CQ Roll Call
Around the world, elections are under attack. U.S. officials could learn from other countries about how to ensure everyone's vote is recorded and counted accurately.
Seven hackers tied to the Iranian government were indicted for attempting to take over a New York dam’s control system.
Alex Wong/Getty Images
The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.
Who is responsible for protecting consumer data? Data breaches are now a regular occurrence, and governments are stepping in.
Failure of corporations to protect data means that government regulation is required to ensure corporation compliance.
What digital border controls should be used in Russia?
The Russian government would like to free itself from the global Internet. This push for “digital sovereignty” has raised technical scepticism and political concerns.
A push for digital peace is growing around the world.
Dozens of countries and hundreds of firms and nonprofits are fed up with digital violence and are working toward greater cybersecurity for all.