All Security Culture
- Cybersecurity firms need millennials — here’s how they can change to attract top talentProfessionals under 30 today will make up three quarters of the cybersecurity workforce by 2025
- What are the world’s information security professionals thinking about?Understanding the global information security workforce is a necessary first step to growing and building the field.
- Hackers for good: A bug bounty hunter's path to AmericaSo-called 'bug bounty' programs, which pay ethical hackers anywhere in the world for reporting security flaws, are the ticket for one Indian security researcher to study in the US.
- Privacy by design: How fashion combats surveillanceDesigners, artists, and students around the world are creating accessories and clothing meant to hide wearers' identities from mass surveillance.
- Opinion: Why Washington needs more hackersThe federal government is finally beginning to embrace hackers, but it should do more put their talents to work fixing the nation's cybersecurity. Their help is sorely needed.
- Video: How to create a secure password, as told by a 12-year-oldA young New Yorker started her own business to sell secure passwords.
- Can cybersecurity boot camps fill the workforce gap?A startup in Denver and an initiative in Chicago are using cybersecurity boot camps to quickly prepare workers to fend off digital attacks.
- How should 1 billion users respond to epic Yahoo hack?The scope of the breach is a harsh reminder how everyone on the web needs to be vigilant about protecting their data in an era of widespread criminal and government hacking.
- When mom becomes Big BrotherWhat are the tools and tricks of internet tracking in the home, and why building a domestic surveillance state is worth it for one family.
- The legal exemption making life easier for ethical hackersAn exemption to the Digital Millennium Copyright Act allows hackers to conduct good will research into medical devices, automobiles, and other internet-connected devices without threat of lawsuits from manufacturers.
- Video: A bitcoin allowance teaches spending and securityKryptina is one of the world's youngest users of the digital currency bitcoin. Her dad gives her a bitcoin allowance as a lesson in online security and money management.
- How Social Security numbers became skeleton keys for fraudstersThe Social Security number is overused and abused by hospitals, banks, and even retailers, putting millions of Americans at risk of identity theft. But experts say it doesn't have to be this way.
- Opinion: The election's hard cybersecurity lessonWhile politicians, pollsters, and the public will look for lessons in this historic presidential election, one of the biggest takeaways is everyone needs to do a better job when it comes to protecting their data.
- Video: More kids are becoming 'white hat' hackersOne striking theme from Passcode's profile of 15 hackers under 15 years old: The kids all had a strong sense of ethics – and a desire to create a safer digital future for their peers – rather than create chaos online for pranks.
- Cover StoryThe kids who might save the internetA new generation of cybersecurity prodigies breaks into networks – just to make them safer. Meet the young hackers trying to keep the web from tilting to the dark side.
- DHS cyber chief to young hackers: Help us protect the gridAt a hacking competition Passcode hosted in Washington, Phyllis Schneck said threats against critical infrastructure "keeps us up at night" – and encouraged young security researchers to partner with the government to help curtail the threat.
- Opinion: Don't drop fitness standards for military hackersThe notion that the government needs to lower personnel standards to attract cybersecurity researchers just perpetuates stereotypes of hackers as basement-dwelling slobs.
- Meet the winners of the Passcode CupAfter a four-hour hacking competition organized by Passcode on Friday, October 21, the team from the University of Virginia emerged as the winners.
- In cybersecurity contest, hackers target critical infrastructureAt the inaugural Passcode Cup capture the flag challenge, competitors raced through hacking challenges that ranged from password-cracking to compromising a mock water treatment facility.
- The technologist convincing the Pentagon to love hackersLisa Wiswell was the driving force behind the Defense Department's first-ever bug bounty program, which rewarded outside security researchers for finding vulnerabilities in its websites. Now, the Pentagon is expanding the effort.