Pending bills to address online piracy and counterfeiting are technically irresponsible and err by making third-party service providers responsible for enforcement.
The court's decision that use of a GPS tracking device constitutes a search relied on property rights and did not address the question of privacy in an increasingly online world.
The attack by hacktivist group Anonymous against law enforcement and entertainment sites caps a week that shows cyberspace is emerging as an arena for grassroots political activism.
It didn't take a crystal ball to predict the main threat trends for last year, but seeing them coming didn't make them any easier to stop.
New research in creating time holes to cloak events sounds esoteric, but hackers might be able to use it to mask online intrusions into IT systems.
The breach of credit card and other data shows that too many organizations still ignore the basics, exposing themselves to serious, if low-level, threats.
Security budgets aren't likely to be plentiful in 2012, but there are things you can do that don't cost much.
The Technology Policy Institute has developed a model for evaluating just how well the Internet is fulfilling its potential for hyperbole.
Policies for Top Level Domain expansion put too much burden on trademark holders to defend themselves against infringing domain names.
When a water pump burned out in Illinois, everyone was ready to point the finger at Russian hackers, proving we don't know enough about cyberspace and our own systems to effectively engage in cyber warfare.
The land rush for new .anything top-level domains is expected to begin next month, but the price of admission will be steep.
The shift to the new generation of Internet protocols has begun in earnest, and organizations should begin planning for how IPv6 will be integrated into the enterprise.
Bot networks are clever enough to harvest personal information from social networking sites. But are these social bots smart, or are we just being dumb?
At the heart of the debate over the Computer Fraud and Abuse Act's "authorized access" provisions is the question of who gets to write federal law: Congress or corporations.
Requirements for using Personal Identity Verification credentials for logical access to networks appear to be forgotten in the adoption of mobile devices in the enterprise.