What if the Russian FSB were responsible for defining the ISO standards for blockchain technology?
DayZero: Cybersecurity Law and Policy
DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.
A working group at the Federalist Society's Regulatory Transparency Project has a new white paper on regulating emerging technologies.
The Government Accountability Office last week published a report that, among other things, weighs in on the pros and cons of the NSA/CYBERCOM “dual-hat” system (pursuant to which the director of the NSA/CSS and commander of CYBERCOM are the same person). The report deserves attention but also some criticism and context. Here’s a bit of all three.
1. What is the “dual-hat” issue?
Newly revived calls for the U.S. government to release all the vulnerabilities it holds are understandable but misguided.
A detailed breakdown of the Internet of Things (IoT) Cybersecurity Improvements Act of 2017.
The proposed bill from Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines is a good first step in securing the Internet of Things and U.S. government systems in particular.
A study of the takedowns of AlphaBay and Hansa marketplaces.
Subscribe to DayZero: Cybersecurity Law and Policy via RSS.