Cybersecurity

Online Trust Takes More Than Mom’s Maiden Name

How many websites do you shop? How many passwords do you have for your various online accounts? How many times have you used your mother’s maiden name, your place of birth or some other piece of personally identifiable information to verify your identity in a transaction? Quite a few, I would guess, and therein lies … Read More >>

Cloud Computing

A 10-Step Policy Plan for Cloud Computing In Europe

With its promise of greater efficiency, productivity and value for money, cloud computing has emerged at just the right time for businesses, governments and organizations looking to do more with less. For policy-makers, getting the balance between innovation and regulation right is a key challenge, and the debate is gaining momentum in Europe and elsewhere. … Read More >>

Cybersecurity

In Cybersecurity, It’s “Learn and Adapt”

The US Army and Marine Corps’ official Counterinsurgency Field Manual opens with a quote that could easily serve as a motto for cybersecurity professionals: “This is a game of wits and will. You’ve got to be learning and adapting constantly to survive.” General Peter J. Schoomaker was describing how to confront asymmetric military and political … Read More >>

Cloud Computing

How Will Hackers Fare in the Cloud?

If Willie Sutton had been a hacker, we know what he’d have thought about cloud computing. Sutton, of course, was the 1930s bank robber famous for his quip that he robbed banks “because that’s where the money is.” And for hackers, the cloud might be just as tempting because it’s where a great deal of … Read More >>