This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Cyber attacks originating in China have been discovered to spy on economic efforts at U.S. businesses, especially those in finance, technology and aerospace.
The Chinese telecom company is facing fears of both equipment vulnerabilities and national security threats as it seeks to expand its business to Australia, the UK, India and the U.S.
A former security officer at a U.S. consulate in China pleaded guilty to attempting to pass secrets about the building's security systems to a Chinese spy agency.
Background checks on U.S. citizens attending flight school are delayed until the student applies for a pilot's license, causing worries about homegrown terrorists.
U.S. Homeland Security Secretary Janet Napolitano said she would consider having tech companies partner with the government to combat foreign-based attackers.
As CEO of the North American Electric Reliability Corporation (NERC), the organization charged with overseeing the reliability and security of the North American grid, I am deeply concerned about the shifting risk landscape facing the power industry. Conventional risks include randomized events such as extreme weather and equipment failures, while the emerging risks that could result from the intentional actions of unknown adversaries are asymmetrical and much less known. We are often left to imagine scenarios that might occur from such attacks and prepare to avoid or mitigate the consequences.