Campaigns ramp up cybersecurity

From The Washington Examiner: Among the tools and tactics available to campaigns are two-factor authentication, restricting access to important files so they are not on a shared server, and segmenting networks, said Paul Rosenzweig, a senior fellow…
Cybersecurity and the Mueller Report

Cybersecurity and the Mueller Report

It isn’t as sexy as the overall question of Russian information operations or the president’s obstructive criminal behavior, but as someone focused on cybersecurity more generally, I thought it would be amusing to tease out a few of the issues in the…
Mueller’s Hidden Nuggets

Cybersecurity News Briefs

SHOULDN’T SOME ONE INVESTIGATE cybersecurity events to determine what happened, and how similar incidents might be prevented in the future? And with no effort to cast blame or judge whether the savings would justify the cost? There is an agency that…