Legislation designed to fight cyber threats appeared poised for congressional passage following several failed attempts, with the White House on track to prevail despite objections from privacy activists.
How do cybersecurity experts discover how to properly defend a system or build a network that's secure?
A new study by Max Kilger, director of Data Analytics Programs at The University of Texas at San Antonio (UTSA) College of Business, is delving into an aspect of cybersecurity rarely explored before now: the human component. ...
Apart from rogue hackers, criminal organizations or even state-backed cyberwarfare units, Japan's businesses and government agencies are facing a unique cybersecurity foe: themselves.
Cybersecurity is one of the defining issues of our time. Can we keep our networks, devices and critical systems open, safe and secure, while maintaining personal privacy? How do we develop tomorrow's cybersecurity solutions?
Survey finds executive cybersecurity decisions are evolving from compliance to proactive cyber-risk management
A new research study from SMU's Darwin Deason Institute for Cyber Security finds that executives are changing the way they manage and invest in cybersecurity, moving away from limited, reactive approaches and adopting systemic ...
Hillary Rodham Clinton has come under fierce criticism for doing business over personal email while secretary of state, putting sensitive data at risk of being hacked. But her communications may not have been any more secure ...
It is easy to get lost in a sea of information when looking at cybersecurity issues. And hearing about hacks and cyberattacks as they happen is a surefire way to feel helpless and totally disempowered.
The board of directors at construction and engineering company Parsons Corp. needed to fill a seat two years ago.
A top Obama administration official says the government and the data security community need to focus on building trust so information about cyber threats can be shared between them for the greater good.