Malicious cyber activity from other states and non-state actors shows no sign of abating anytime soon. Both the U.S. and India have been working on behavioral norms in cyber space—an effort that should be sustained. Bad actors, however, do not…
As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it than the As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it…
I’ve received this draft text from 3 different sources: STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is…
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the “theater of the absurd” division of reasons…
There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. From the…
Almost everything we think we know about homeland security is outdated. Almost everything we think we know about homeland security is outdated. If the lessons of Paris (twice), Brussels, San Bernardino, Orlando, Istanbul (just yesterday), Sony, the…