Form should follow function. That’s a cardinal rule of architecture and also a cardinal rule of corporate organization. Anyone who saw the video earlier this year where hackers successfully took remote control of a Jeep Cherokee knows that, in the…
Earlier today, the Senate passed the Cybersecurity Information Sharing Act (CISA) by a vote of 74-21. Early reports are that most of the more significant privacy-related amendments were rejected, as was the proposal to eliminate DHS’s status as the…
A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…
As Wells reported Monday, the Third Circuit has issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp. Readers may recall the background of the case. Wyndham was hacked by a Russian criminal gang who stole a host of personally…
The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…