vulnerabilities

Latest in vulnerabilities

Cybersecurity

Breaking WPA2

Sometimes we are reminded that the "noise" of policy drowns out important practical news.  Today is one of those days.  While we sit around worrying about Harvey Weinstein and Trump's latest tweet, it turns out that the encryption protocol at the core over almost all WiFi is vulnerable to attack. 

Cyber Command

Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report

The Government Accountability Office last week published a report that, among other things, weighs in on the pros and cons of the NSA/CYBERCOM “dual-hat” system (pursuant to which the director of the NSA/CSS and commander of CYBERCOM are the same person). The report deserves attention but also some criticism and context. Here’s a bit of all three.

1. What is the “dual-hat” issue?

Subscribe to Lawfare

EmailRSSKindle