A change to the cyberthreat [Commentary]

A change to the cyberthreat [Commentary]

How do you make decisions when you do not know what data is real and what data has been manipulated?

Should spies use secret software vulnerabilities? [Commentary]

Should spies use secret software vulnerabilities? [Commentary]

It’s a choice of how best to protect the public: Exploit software vulnerabilities to collect intelligence information that may help keep people…

WannaCry legacy: How the attack will shape cybersecurity [Commentary]

WannaCry legacy: How the attack will shape cybersecurity [Commentary]

The WannaCry ransomware that has affected more than 230,000 computers in 150 countries now has largely halted its crawl across the globe, but experts…

Cybersecurity — A big deal for contracting [Commentary]

Cybersecurity — A big deal for contracting [Commentary]

It is imperative that best practices be shared across disciplines and that everyone be involved — and fast!

Filling the cybersecurity void [Commentary]

Filling the cybersecurity void [Commentary]

Many of those that I asked believe that new and unique approaches to cybersecurity is likely to be the dominant differentiation for new entrants in…

Top