Eight years ago, the Center for Strategic and International Studies published an influential report that was a blueprint for early cybersecurity policy development in the Obama Administration. Eight years ago, the Center for Strategic and…
According to this report from Reuters, Hewlett Packard Enterprises (HPE) has allowed the Russian military to review the source code for ArcSight, a cybersecurity alert system widely used in the Pentagon and in the American private sector. Published…
Earlier today, the Chinese government released its National Cybersecurity Strategy. A government news agency report on the release is here. According to the report: “China’s top Internet regulator released a cyberspace security strategy on Tuesday,…
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the “theater of the absurd” division of reasons…
Last week, co-blogger Nick Weaver posted a short summary of why he holds the view that Apple products are safe, but that Android products systematically are not. His recommendation was to throw your Android phone in the garbage and he asked, somewhat…
There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. From the…