The Lawfare Institute convened a working group of experts to answer that question. The group’s report, titled “Creating a Framework for Supply Chain Trust in Hardware and Software” is available now. In a world of growing dependence on technology,…
A Resource for Attorneys, Law Firms, and Business Professionals, Third Edition Edited by Jill Rhodes, Robert S Litt, and Paul S Rosenzweig With the growing volume and sophistication of cyberattacks, it is important to ensure you are protected. The new third edition...
NATSEC OFFICIALS BACK APPLE — Nearly two dozen former national security officials made a familiar argument in an amicus brief filed late last week in the ongoing antitrust battle between Epic Games and Apple: allowing iPhone owners to download mobile…
The Great Courses, The Teaching Company Cyberspace is the 21st century’s greatest engine of change. And it’s everywhere. Telecommunications, commercial and financial systems, government operations, food production – virtually every aspect of global...
Rare are the moments when policy wonks get to put their theory into practice. But today we are happy to announce the White Hat Cyber Forecasting Challenge! We invite every Lawfare reader to take up the challenge of issuing predictions on future…
The possibilities of surprise in cyberspace are almost limitless. You can’t predict a surprise. But, the degree of surprise often varies. Some, like the attack on Pearl Harbor, are deep strategic surprises (for the classic analysis, I recommend…