Cybersecurity

Securing “here, there and everywhere”

Securing data in cyberspace is not easy. Just ask Sony, which has seen its systems repeatedly hacked in recent weeks, with personal information stolen from more than 100 million user accounts. Or ask Google and the hundreds of high-profile Gmail users who were recently hacked. Or even ask RSA, the security technology company, which had … Read More >>

Cybersecurity

Piracy and Security Threats Go Hand In Hand

Ten years ago, the main threats to security online were vandals and hackers. They chased notoriety and relished the challenge of beating security systems. Their calling cards tended to be denial-of-service attacks, which they used to bring down prominent sites such as eBay and CNN. Today, the stakes are much higher. Organized criminal enterprises are … Read More >>

Cybersecurity

An Action Plan on Cybersecurity

The last Congress adjourned without enacting cybersecurity legislation. That certainly does not send the debate back to square one, because at least one major bill from last year has already been reintroduced in the 112th Congress — the Cybersecurity and Internet Freedom Act of 2011 (S. 413), offered by Sens. Joe Lieberman (I-Conn.), Susan Collins … Read More >>

Cybersecurity

Online Trust Takes More Than Mom’s Maiden Name

How many websites do you shop? How many passwords do you have for your various online accounts? How many times have you used your mother’s maiden name, your place of birth or some other piece of personally identifiable information to verify your identity in a transaction? Quite a few, I would guess, and therein lies … Read More >>