From The Washington Examiner: Among the tools and tactics available to campaigns are two-factor authentication, restricting access to important files so they are not on a shared server, and segmenting networks, said Paul Rosenzweig, a senior fellow…
Recent Articles
- Provably Autonomous Artificial Intelligence November 7, 2024
- Judge Cannon Has Gotten It Completely Wrong July 15, 2024
- Black Box Reasoning and the Rule of Law June 10, 2024
- Content Moderation and the Least Cost Avoider June 9, 2024
- The Lawfare Podcast: Timothy Edgar and Paul Rosenzweig on the Volt Typhoon Cyber Intrusion March 18, 2024
- Big Tech’s trouble in China: New ‘work secrets’ law could force tough choices March 15, 2024
- Volt Typhoon and the Disruption of the U.S. Cyber Strategy March 4, 2024
- With Trump’s SCOTUS Appeal, Justice Delayed Is Justice Denied March 1, 2024
- The Russian Hack of Microsoft: Lessons for Cybersecurity January 24, 2024
- The Lawfare Podcast: Year-End Event, Part Two: A Conversation with the Lawfare Team December 24, 2023
Article Categories
- Artificial intelligence (12)
- Cybersecurity (418)
- Data Privacy (10)
- Donald Trump (31)
- Election Security (23)
- Homeland Security (136)
- National Security (142)