A review of the National Security Strategy’s cybersecurity components.
Latest in Cybersecurity
We spend a lot of time on Lawfare describing the problems that result from data exfiltration, whether government policies should change as a result, etc. This post is a bit of a change; it's about technical ways to protect yourself–or more accurately, a link to such.
We need a national strategy for securing elections.
An unsealed indictment of three Chinese nationals charged with hacking the systems of U.S. companies for economic advantage calls into question the robustness of commercial espionage norms.
With newly released details on the Vulnerabilities Equities Process (VEP), it’s time for legislation on government hacking and vulnerabilities disclosure.
The submarine communications cables that carry internet traffic around the world are vulnerable to physical and virtual attacks. A patchwork of international law protects them from intentional damage.
On Wednesday, the White House released a charter on the vulnerability equities policy outlining how the federal government will alert private companies to cybersecurity flaws or refrain for intelligence purposes. Here is the White House statement:
Technology presents both consumer convenience and risk, creating a conflict between security and privacy as government agencies seek to weaken the protections that consumers want heightened.
The American Bar Association has released the second edition of it's handbook for professionals. Entitled (rather unimaginatively :-)), "The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Profession
A look at Rep. Tom Graves’ revised bill, how it differs from his original proposal, and the implications of the bill’s newest elements.