Urs Gattiker published a new information security dictionary this year; it is subtitled, “Defining the terms that define security for e-business, Internet, information and wireless technology.” ...
A three-year freeze on public spending on everything except entitlements, veterans benefits and security? By signing up, you confirm that you are over the age of 16 and agree to receive occasional ...
"It's the food, stupid." That's essentially the message of "World On The Edge," a new report by Lester Brown, head of the Earth Policy Institute and one of "Foreign Policy" magazine's 100 leading ...
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual ...
The Cloud Security Alliance and others are working to define security requirements for SaaS, IaaS, and PaaS cloud computing models. Cloud computing is one of the most-discussed topics among IT ...
Election Day approaches, which means it is time for House Republicans to run fully amok. Today, the House will take up a bill by Indiana Republican Mark Souder to lift the gun controls in the District ...
We are under attack. In fact, we are experiencing the first skirmishes of an all-out cyberwar. Look at the headlines over the past several years and you will see the pattern. Hackers aren’t just the ...
Blog posts represent the views of CFR fellows and staff and not those of CFR, which takes no institutional positions. Earlier this month, the United States and NATO lowered the flags over their ...
The security industry has struggled to define security culture for a long time. Security leaders talk about its value, but they tend to do so without precision—which can be incredibly confusing for ...