At the CyberMed Summit in Arizona, simulated hospital emergencies highlight today’s medical-cybersecurity challenges. At their heart: education, collaboration, and advocacy.
Without regulatory pressure to enforce a federal health care cybersecurity task force’s recommendations, involved experts acknowledge, industry progress will remain slow.
It’s not just Be’ersheba’s interdisciplinary approach. Israel’s unique politics, geography, and economics have played major roles in its transformation into a cybersecurity power player.
“A CERT is like FEMA for cyber,” one expert says. Post-WannaCry, Israel is following the Netherlands, England, and Norway in creating a health care CERT.
While the privacy regulations focus on protecting EU residents, regulators like the FTC could force major companies to abide by their GDPR-compliant policies around the world.
To address cyberrisks, former Pennsylvania governor and DHS secretary Tom Ridge says the relationship between the private and public sectors needs to move from punitive to collaborative.
Critics push for the Trump administration to deliver on its promise of a national cybersecurity policy—one that has more legal weight than words like “should” and “may.”
The release of computer vulnerability exploits collected and stockpiled by U.S. intelligence agencies highlights internal security and cultural structures that aren’t likely to change. Here’s why.
The 3-section order, which builds largely on initiatives the Obama administration set in motion, outlines federal guidance to “create more cohesion and consolidation between agencies.”
As regulation of Internet-connected devices inches forward, public officials and security experts disagree on how best to keep consumers safe without stifling industry innovation.
Attributing cyberattacks to specific people or organizations is far from an exact science. And a misattribution today runs a high risk of increasing military tensions.
Granick, the director of civil liberties at Stanford Law School and recent author of “American Spies,” sounds off on the nature, effectiveness, and justness of U.S. surveillance today.
Trump’s travel ban accompanied increased scrutiny of travelers’ electronic devices and social-media activity. Here are a few steps you can take to minimize your exposure at country borders.
As the new president establishes his cabinet, and issues (and holds back on) security-focused executive orders, questions abound about his cybersecurity intentions—and how he might follow through on them.
After a presidential election marked by hacks and leaks and claims of “bleak” urban streets, those of the nation’s capital were filled—quite literally—with anger and worry. And hope.
In the wake of stunted recounts in three closely contested states, security researchers argue that to ward off hacker manipulation of elections, municipalities must maintain and audit paper ballots.
Will Trump be able to fill key positions? Will he heed warnings about Russia? Will he look to force tech companies to create encryption backdoors? Here’s what several experts tell us.
Regardless of whether the Mirai botnet disrupts the U.S. election, IOT device exploits will continue to contribute to a less stable Internet until stronger security protocols are implemented, security experts say.
Empower the individual. Keep private information private. Make the complex simple. And detect an intruder in milliseconds. McAfee and hacker Eijah say these ideas are driving their new business.
“No. 1: Fire or massively retrain every employee in the U.S. government responsible for implementing cybersecurity,” advises the software entrepreneur, a former presidential candidate.
The former DHS secretary tells The Parallax that as people raise their consciousness about security, nations urgently need to form agreements about cyberwarfare limits.
From a plea for an “NIH for cyber” to a plan for “software supply chain transparency,” Black Hat and DefCon insiders say it’s time for the U.S. government to ensure software safety.
Communication algorithm researcher Christian Sandvig, who joined the lawsuit against the longtime antihacking law, tells The Parallax that regardless of its outcome, something has to change.
Counterterrorism expert John D. Cohen tells The Parallax that to tackle terrorists’ effective Internet recruitment efforts, we need to first understand the underlying issues.
While companies set up programs for hackers to report vulnerabilities, independent marketplaces buy and sell hacks to popular software programs with no oversight or accountability.
Itzhak “Zuk” Avraham, founder of Zimperium, has been confident that his Israeli colleagues at Cellebrite would successfully help the FBI unlock the iPhone 5C of Syed Farook. Here’s why.
Although businesses can get insured against losses from online attacks, it’s almost impossible for consumers to do the same. Here’s why—and what you can do instead.
In the 30 years since President Reagan signed the Computer Fraud and Abuse Act into law, it’s been the subject of heated controversy and undergone many alterations. What’s next?
Apple is citing the First Amendment in its programming dispute with the FBI over an iPhone used by a government employee accused of terrorism. Here’s why.
Tech issues may be too complex—and too lacking of simple populist messages—to argue about on stage. But the candidates have their opinions. Here’s an overview.
They’re designed to prevent unauthorized people from firing them, advocates such as the Obama administration say. But are they better (and safer) than safes and trigger locks?
The Data Security and Breach Notification Act and the Data Security Act would pre-empt arguably stronger state laws and strip the FCC of authority over data security enforcement.
In the wake of the terrorist attacks in France, U.S. government agencies, including the CIA, are reiterating their arguments for security standard backdoors into communications data.
As the technological capabilities of unmanned aerial vehicles proliferate, privacy groups are pushing for laws to require police to obtain warrants to use them.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.
Illinois ruling addresses several of privacy advocates’ issues with law enforcement agencies’ use of secretive “stingray” tracking technology to collect cell phone data.
What’s a bigger threat: government surveillance or data collection? The Parallax asks representatives of three prominent groups to explain (or refute) some of consumers’ biggest privacy concerns.
The political establishment and the tech industry aren’t clashing for the first or last time over the government’s proper role in safeguarding privacy and cybersecurity.
Some security and policy experts see the agreement as a potential model for new treaties—or, at the very least, a sign of progress. Others see a whole lot of problems.