As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it than the As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it…
I’ve received this draft text from 3 different sources: STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is…
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the “theater of the absurd” division of reasons…
There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. From the…
Almost everything we think we know about homeland security is outdated. Almost everything we think we know about homeland security is outdated. If the lessons of Paris (twice), Brussels, San Bernardino, Orlando, Istanbul (just yesterday), Sony, the…
A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…