The latest instance of “what-aboutism” is the House Republican decision to open an investigation of the Uranium One transaction—the allegation that Hillary Clinton transferred control of 20% of America’s uranium mining output to a Russian company, in…
Key Takeaways Congressional House Republicans have introduced a proposal to make NIST responsible for cybersecurity audits across the government. The idea is flawed in many respects—most especially because asking NIST to do an audit is asking them to…
The failure of the government to provide adequate protection has led many cybersecurity analysts, scholars, and policymakers to suggest that there is a need for private-sector self-help. If the government is unable or unwilling to take or threaten…
Malicious cyber activity from other states and non-state actors shows no sign of abating anytime soon. Both the U.S. and India have been working on behavioral norms in cyber space—an effort that should be sustained. Bad actors, however, do not…
As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it than the As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it…
I’ve received this draft text from 3 different sources: STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is…