CSIS fellow Jim Lewis says we need to bring a full range of diplomatic and intelligence resources to bear against Chinese incursions into U.S. systems, not just beef up cybersecurity.
FCC was upbraided by auditors for cutting corners in upgrading network security. Did the commission create unnecessary risk or just do what was necessary?
Identity theft could be costing the government billions of dollars a year in fraudulent tax refunds, and it is hard to say whether the shift to electronic tax filing is a boon or a bane.
The House of Representatives has ruffled feathers by banning a peer-to-peer music network, but P2P raises security concerns that merit caution.
It's easy to forget that the Internet relies on physical infrastructure that can break. Not every disruption is an attack.
After more than a decade, the Federal Information Security Management Act could use some updating, but Congress should take the time to look at what really has worked.
Distributed denial-of-service attacks are becoming more common, more powerful and the botnets that support them more resilient.
Once again admins are being advised to disable Java in the wake of a new vulnerability. It's time to decide how important this plug-in is to your enterprise and when -- if ever -- it should be used.
A new study of the evolving cyber threat landscape identifies a half-dozen areas likely to be high-profile targets in the immediate future, including something called "trust infrastructure."
Today's systems, policies and procedures were developed to lock information down, not to share it securely. Interoperable credentials could be the key.