Cybersecurity

Must Read

Vanity Fair: Enter the Cyber-dragon

Author: Michael Joseph Gross

Hackers have attacked America's defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. Michael Joseph Gross gets an exclusive look at the raging cyber-war--Operation Aurora! Operation Shady rat!--and explains why Washington has been slow to fight back.

See more in China; United States; Cybersecurity

Must Read

The Chronicle of Higher Education: Why Privacy Matters Even if You Have 'Nothing to Hide'

Author: Daniel J. Solove

"The deeper problem with the nothing-to-hide argument is that it myopically views privacy as a form of secrecy. In contrast, understanding privacy as a plurality of related issues demonstrates that the disclosure of bad things is just one among many difficulties caused by government security measures. To return to my discussion of literary metaphors, the problems are not just Orwellian but Kafkaesque. Government information-gathering programs are problematic even if no information that people want to hide is uncovered."

See more in North America; Cybersecurity

Must Read

Lumension: Federal Cyber Security Outlook for 2010

How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government initiatives, such as the Comprehensive National Cybersecurity Initiative and the creation of the U.S. National Cybersecurity Coordinator role, be effective in addressing the challenges facing U.S. critical IT infrastructure? What is the impact of compliance on security within the federal IT environment?

See more in United States; Cybersecurity

Op-Ed

The U.S. Government Should Pay Anonymous in Bitcoin to Fight ISIS

Author: Emerson Brooking
Foreign Policy

Writing in Foreign Policy, Emerson Brooking argues that, given ISIS’ strategically significant use of social media for recruiting and messaging, any comprehensive plan to defeat the terror network must also neutralize its online presence. He proposes the creation of a bounty system that would pay hacktivists in anonymized Bitcoin to flag ISIS social media accounts and disrupt its websites. 

See more in United States; Cybersecurity; Counterterrorism

Op-Ed

2014: The Year in Cyberattacks

Author: Sharone Tobias
Newsweek

While Sony may have dominated the news toward the end of 2014, three major cyberattacks against U.S. companies shook the corporate world earlier this year: Target opened the year by announcing in January that hackers had stolen personal information from an estimated 110 million accounts; hackers accessed approximately 83 million J.P. Morgan Chase accounts in August; and Home Depot confirmed that its payment system was breached in September, compromising an estimated 56 million accounts. Here’s a look back at the details of each of those attacks, and how they affected the conversation about cybersecurity in the United States and the corporate sector.

See more in United States; Cybersecurity