Apparent recent successes by Microsoft and the federal government against persistent botnets show the effectiveness of tools such as lawsuits and cooperation among agencies in the battle against cyber crime.
A new round of spam messages use DHS references in the subject lines to entice victims to malicious sites.
FISMA as originally written is not bad, but it hasn't reach its potential because overly broad requirements have created a scramble for regulatory compliance. But there are good ideas available on how to fix the law.
Before plunging into a Cold-War style cyber arms race with our online enemies, the United States needs to decide just exactly what cyberwar is, who should fight it and how to do it.
The recent announcement by the FTC that sensitive information from nearly 100 organizations had been compromised through peer-to-peer file-sharing networks underscores the risks of this technology.
Our critical infrastructure is not a finely tuned, well-oiled machine. And for that, we can be grateful. We are so used to patching it up and finding workarounds that shutting it down proves difficult.
The United States is the most feared nation in the world as the source of potential cyberattacks, according to an international study.
Although the private and public sectors agree on the need to share information for the security of the nation’s critical infrastructure, each believes the other is holding out.
We need better public-private partnerships to secure cyberspace, but if these partnerships are to serve the public interest, they must be as public as they are private.
The unallocated valuable radio frequency real estate could be best put to use as part of a nationwide public safety network. Congress should let FCC combine it with the existing public safety spectrum, says columnist William Jackson.
For just a small fee, you too can have an opportunity to retrieve Nigerian funds belonging to the alleged Christmas Day bomber.
The nation’s electric power grid is a vital part of our critical infrastructure, but it might not be as vulnerable and fragile as it appears. One expert says it is more resilient than we give it credit for.
The U.S. government operates the most powerful supercomputers in the world. Using some of that power to process government health care records would be difficult to set up, but the benefits could be worth it, says William Jackson.
Advanced, networked meters offer the potential for conservation and money savings, but utilities are hesitant to be on the cutting edge of this evolving technology.
President Obama described recent failures in anti-terrorism efforts as systemic. But they were not failures of systems; they were failures of human beings using the systems.