Congress is in recess now (that’s why it’s so quiet here in Washington) and when they return the first order of business for the Senate is to take up the 2014 NDAA. The bill, authorizing activities of the Department of Defense, is one of the few…
Over the past month, Jane Chong has written a series of posts published over at Security States that go under the title “Bad Code.” Her thesis (amply documented) is that those who write software code generally take inadequate precautions to ensure…
Not much, of course. But according to this report in the Washington Post, Secretary Sebelius today responded to reports of a cybersecurity breach that was discovered recently. According to Sebelius “there was not a breach” but a “theoretical problem”…
Over at Security States, I have a post entitled “When Companies Are Hacked, Customers Bear the Brunt. But Not for Long” that details two recent Federal cases in which service providers were found potentially liable for tort injuries arising from…
The purpose of this bibliography, originally prepared for the Future of Cyber Warfare symposium held at George Washington University Law School in April 2012, is to provide scholarly and other resources pr The purpose of this bibliography, originally…