The latest instance of “what-aboutism” is the House Republican decision to open an investigation of the Uranium One transaction—the allegation that Hillary Clinton transferred control of 20% of America’s uranium mining output to a Russian company, in…
Our electoral infrastructure consists of two distinct pieces (or so it seems to me): a broader public context in which elections occur and a narrower system of election management. To date, almost everything we know about Russian electoral…
Key Takeaways Congressional House Republicans have introduced a proposal to make NIST responsible for cybersecurity audits across the government. The idea is flawed in many respects—most especially because asking NIST to do an audit is asking them to…
President Trump’s trip to Europe was not a complete failure — his speech in Poland struck me as reasonable and Presidential. But his meeting with Russian President Vladimir Putin and their discussion on cybersecurity was not a shining moment.…
I am a bit of an outlier in the cybersecurity community since I think that there are circumstances in which private actors ought to be allowed to more aggressively respond to intrusions on their systems (though I don’t go “full postal” on the issue).…
Malicious cyber activity from other states and non-state actors shows no sign of abating anytime soon. Both the U.S. and India have been working on behavioral norms in cyber space—an effort that should be sustained. Bad actors, however, do not…