Increasingly, we are incorporating into our daily lives devices and services that collect metadata: from our smartphones, to our web browsers, to an ever-expanding assortment of IoT-connected appliances, and even our cars. All of these generate…
From Center on National Security: VI: What is the larger definition of cyber threats that would prompt a need for cybersecurity in American society and the world’s liberal democracies? What threats are we actually facing? Paul Rosenzweig: I box cyber…
WASHINGTON — President Trump, desperate to undermine a fast-moving impeachment probe, could be adding to his troubles. House Democrats say Trump’s stonewalling and threats to unmask a whistleblower could lead to obstruction charges if articles of…
Unless a few key Republicans revolt against President Trump and bring the rest of the caucus with them, this situation won’t change. Thus the president has figured out that congressional enforcement mechanisms are mostly notional, says Paul…
WASHINGTON — Despite the constant cyber threat, regulators are giving banks flexibility to choose which cybersecurity framework suits them, an approach hailed by the industry. A recent statement by the federal banking agencies highlighting four…
Joel Trachtman thinks it’s a near certainty that the WTO agreements will complicate US efforts to head off an Internet of Things cybersecurity meltdown, and there’s a real possibility that a US cybersecurity regime could be held to violate our…