Malicious cyber activity from other states and non-state actors shows no sign of abating anytime soon. Both the U.S. and India have been working on behavioral norms in cyber space—an effort that should be sustained. Bad actors, however, do not…
As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it than the As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it…
I’ve received this draft text from 3 different sources: STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is…
The news today is shocking. Russian authorities have arrested a top Kaspersky cybersecurity manager for espionage. The news today is shocking. Russian authorities have arrested a top Kaspersky cybersecurity manager for espionage. Kaspersky is a…
NextGov has a nice summary article on President Obama’s cybersecurity legacy. [Full disclosure: I was interviewed for and quoted in the article]. Here is the intro: NextGov has a nice summary article on President Obama’s cybersecurity legacy. [Full…
To bleg: An entry on a blog requesting information or contributions. I have such a request. I recently came across this article: Trent Moore, DARPA DEVELOPING NEW COMPUTER CODE THAT IS EFFECTIVELY HACK-PROOF. Published by The Lawfare Institute in…