It is not the amount, it is the way you read that counts. You need to keep up more to find out what the problems are than to read to find the solutions.
An annual report released by the Pentagon's chief weapons tester indicates that a majority of the government's weapons programs contain "significant vulnerabilities."
Johannes (Hanno) Bock:
The number of vulnerabilities is huge. Making a promise that you will scan all this information for security vulnerabilities and backport the patches to your operating system is a big promise. And I doubt anyone can fulfill that.
On February 13, 2015, the White House will host a Summit on Cybersecurity and Consumer Protection at Stanford University, to help shape public and private sector efforts to protect American consumers and companies from growing threats to consumers and commercial networks.
The notion that Americans can indefinitely sustain military supremacy along the frontiers of a steadily modernizing and strengthening China is a bad bet no sober analyst would accept. Extrapolating policy from that bet, as we do in the so-called "pivot to Asia," just invites China to call or raise it. We would be wiser and on safer ground, I think, to study how Britain finessed the challenge of America's emergence as a counter to its global hegemony.
The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars' worth of business in China.