If you ask many of the folks on the front line of cybersecurity for our critical infrastructure they will tell you that a large-scale attack is very unlikely to succeed. They will all acknowledge, as they must, that legacy control systems are…
CrowdStrike, a US-based cybersecurity company, has just released its annual Global Threat Report 2013. For those who follow the area, the report reflects some interesting (and disturbing) trends in malicious activity. Most notable:The increased use…
My friend Stewart Baker has likened the privacy requirements of the draft NIST framework to a “privacy tax.” His fear, which has sound economic force, is that the imposition of privacy protective requirements on cybersecurity efforts will drive up…
Lawfare readers will recall that I earlier blogged about the Federal Trade Commission’s case against Wyndham Hotels. Under the mantle of its consumer protection mandate, the FTC has sought to impose civil penalties against those companies who do not…
Just before Thanksgiving, the President’s Council of Advisors on Science and Technology (which has among its membership luminaries such as Eric Schmidt of Google and Shirley Ann Jackson, the President of Renssalaer Polytechnic Institute) issued a…