The use of computers and the Internet in conducting warfare in cyberspace.
Cyberwarfare and Cybersecurity
Verizon is pledging to stop selling information on phone owners’ locations to data brokers, stepping back from a business practice that has drawn criticism for endangering privacy.
Some White House officials view next-generation 5G wireless service as a “key area of competition,” and they say that the threat from China, in particular, justifies a “moonshot” government effort like the construction of the interstate highway sy
Facebook’s former security chief warns of tech’s ‘negative impacts’ — and has a plan to help solve them
For two years, Alex Stamos was the Facebook executive tasked with defending the company’s systems against Russian interference and other critical threats.
Days after revelations of sweeping security vulnerabilities at Facebook and Google, former CIA director John Brennan offered no confidence that we’ve discovered all of yesterday’s bad news about social-network security and can move on to preventin
West Virginia is about to take a leap of faith in voting technology — but it could put people's ballots at risk.
What combination of technology, best practices, policies and regulations promotes growth and innovation without sacrificing privacy? Join the IAPP and your peers in privacy and information security at Privacy. Security. Risk. 2018 in Austin, Texas to work toward an answer.
The National Governors Association (NGA) and New America's Cybersecurity Initiative team up to present a panel to discuss how states and their affiliates are working to use the resources at their disposal to assist local governments in reducing cyber risk.
Cyber threats are targeting every level of government in the United States, from the city level up. Recent events in large cities such as Atlanta, Baltimore, and San Francisco, and small cities such as Beatrice, Valdez, and Matanuska-Susitna Borough have highlighted this threat to local governments.
Sens Richard Blumenthal (D-CT) and Marco Rubio (R-FL) put pressure on IT company Super Micro, asking in a letter that it cooperate with law enforcement and explain more about the potential breach.
A major US telecommunications company discovered manipulated hardware from Super Micro Computer Inc.
Microsoft is making moves to target a growing multibillion market: hosting, storing and running the US government’s most sensitive classified secrets and data.