All Security Culture
- Facebook's plan to train a new generation of cybersecurity pros
The social media giant is making its 'Capture the Flag' security challenge publicly available to encourage high schools and colleges to use gaming as a way of training hackers.
- How much is a security flaw worth? An inside look into Yahoo’s bug bounty program
As companies try to balance the need to be transparent with outside researchers while protecting their own sensitive business information, the often opaque bug valuation process can be controversial.
- Turning information security pros into cybersecurity change agents
The backbone of the information security industry can be unleashed to help solve cybersecurity’s toughest problems.
- Can White House, tech startups overcome gun lobby resistance to 'smart guns'?
Despite fierce resistance from groups such as the National Rifle Association – and safety and privacy concerns about the technology – many gun owners appear open to technology the Obama administration and many tech entrepreneurs say will reduce firearm deaths.
- Dutch art project exposes extent of surveillance, tests limits of law
The arts collective known as SETUP built a detailed catalog of the population in the Netherlands based on open data sources. The information it collected proved so revealing that making it public would violate privacy laws.
- How to raise a white hat hacker
Many of today's tech-savvy kids demonstrate the sort of curiosity that makes them ideally suited to become tomorrow's ethical hackers. The trick is teaching them how to use those instincts for good, and steering them away from the darker corners of the Internet.
- How we can get ‘more of everything’ for the cybersecurity workforce
With a need for 1.5 million more trained professionals in coming years, the federal government, universities, and companies are teaming up to solve the problem.
- Why does our privacy really matter?
Philosophy professor Michael Lynch says that privacy violations erode individuals' rights to autonomously make their own decisions and exercise individual power.
- How secure is your data? Take our quiz and find out
Do you use Tor browser, two-factor authentication, or a VPN? Do you know what those things are? With data breaches commonplace and digital surveillance on the rise, there's no better time to find out if your own private information is shielded from prying eyes. Take our quiz designed in partnership with the Mozilla Foundation and the Center for Democracy and Technology to find out how to secure yourself against a growing number of threats online.
- US CIO Tony Scott on fixing cybersecurity's talent gap
At a Passcode event Tuesday, the US chief information officer said the federal government wants candidates who know languages, biology, and anthropology to fill cybersecurity roles – and one of its most important hires, the new chief information security officer, will be announced within 30 days.
- Watch live: Workforce 2.0, cultivating cybersecurity professionals
Around the world, an estimated 1 million cybersecurity jobs are currently unfilled. Join a panel discussion on how to cultivate cybersecurity talent on Tuesday, April 12.
- Tor aims to grow amid national debate over digital privacy
The Tor Project's new executive director Shari Steele is on a mission to change the image of the group's anonymous browser and make its 'clunky and hard to use' technology more user-friendly.