I am a bit of an outlier in the cybersecurity community since I think that there are circumstances in which private actors ought to be allowed to more aggressively respond to intrusions on their systems (though I don’t go “full postal” on the issue).…
The failure of the government to provide adequate protection has led many cybersecurity analysts, scholars, and policymakers to suggest that there is a need for private-sector self-help. If the government is unable or unwilling to take or threaten…
Rumors had it that the Cybersecurity EO was contingent on resolving how to deal with IT technology development and innovation. Now that the innovation Executive Order is public, a revised Cyber EO is circulating. Here is the copy I received: Rumors…
Malicious cyber activity from other states and non-state actors shows no sign of abating anytime soon. Both the U.S. and India have been working on behavioral norms in cyber space—an effort that should be sustained. Bad actors, however, do not…
As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it than the As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it…
I’ve received this draft text from 3 different sources: STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is…