Security

Wikileaks’ CIA dump is the biggest secret cache released so far. It’s embarrassing to the CIA. It undermines our intelligence efforts. And it didn’t need to happen. The sad fact is that the world’s computers are not configured securely enough to match the confidentiality of the...

AWS operations explains that it was tougher to restart its S3 index system this time than the last time they tried to restart it. The Feb. 28 outage of Amazon's Simple Storage Service says one thing loudly and clearly: Amazon Web Services is growing so fast...

Cybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute. The human instinct is to try to find those responsible. However, any attempt...

Only 29% of US businesses have cyber insurance; Deloitte outlines steps for insurance companies to improve risk models, communication, and policy sales. Sales of cyber insurance policies are suffering from a lack of shared data about security incidents, too few standard definitions, and not enough focus...

Called the “largest interconnected machine,” the U.S. electricity grid is a complex digital and physical system crucial to life and commerce in this country. Today, it is made up of more than 7,000 power plants, 55,000 substations, 160,000 miles of high-voltage transmission lines and millions...

I recently returned from a vacation to find that Google’s algorithms had created a customized slide show of my trip. I hadn’t asked for one. But the company’s software robots apparently noticed I’d traveled somewhere and taken a flurry of photos, which likely indicated I’d...

With Republicans now in power across the government, Congress has moved aggressively toward undoing Obama-era tech policies. Net neutrality, the rule that ensures equal access to all websites, and broadband privacy rules are the first targets. Lawmakers also hope to play a bigger role than in...