Ideas Made to Matter Cybersecurity

3 steps toward safer and sounder software

By

It takes hyper-awareness, operational readiness, and swift adaptation.

Jun 5, 2018
Read Article
Ideas Made to Matter Cybersecurity

What CIOs should understand about adversaries and innovation

By

When it comes to cyber threats, the CIO should own the problem completely.

May 30, 2018
Read Article
Ideas Made to Matter Data Privacy

What to watch after GDPR's rollout

By

Setting up some unsolvable problems, and the inevitable government versus industry showdown.

May 23, 2018
Read Article
Ideas Made to Matter Economy

Is a cryptocurrency a security? Depends.

By

MIT senior lecturer and former financial regulator Gary Gensler says 'well over a thousand' tokens will face regulatory reckoning.

May 4, 2018
Read Article
Ideas Made to Matter Cybersecurity

Electronic system holds up during Kenyan election

By

During the 2013 election, officials had to switch to manual systems at the last minute.

Aug 9, 2017
Read Article
Ideas Made to Matter Cybersecurity

How to survive a hack: Management trumps technology

By

Companies must build a culture of security, or risk a disastrous attack on data and infrastructure.

May 18, 2017
Read Article
Ideas Made to Matter Social Media

Fighting online extremists with machine learning

By

Using networks and artificial intelligence to pre-emptively identify and shut down ISIS on Twitter.

Apr 6, 2017
Read Article
Ideas Made to Matter Digital Economy

Four new business insights from MIT Sloan Management Review

By

What you don’t know about cybersecurity, why water threatens your supply chain, and more.

Jan 17, 2017
Read Article
Ideas Made to Matter Finance

Financial institutions must fight cybercrime from inside and out

By

Bank hacks, social engineering, and digital currency all get time at Cambridge Cyber Summit.

Oct 6, 2016
Read Article
Ideas Made to Matter Cybersecurity

Keeping hackers at bay: A Q&A With Okta’s Frederic Kerrest

Co-founder of identity management company talks passwords, spyware, and mobile security.

Nov 2, 2015
Read Article