Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Third-party liability for cybersecurity failures just got a lot more real. → Read More
The legal authorities to protect the American public from drone threats expire on Dec. 9. → Read More
The first thing Nancy Pelosi should do if she retains her position as speaker of the house. → Read More
The possibilities of surprise in cyberspace are almost limitless. → Read More
Rogers' classic song, “The Gambler,” can be read as a parable about cybersecurity and the perils of doing business in authoritarian nations. → Read More
The 20th anniversary of the founding of the Department of Homeland Security looms in early 2023. What should the next Quadrennial Homeland Security Review study? → Read More
Just five years ago, in September 2016, a significant change in the operation of the internet occurred. Known as the IANA (Internet Assigned Numbers Authority) transition, it involved the U.S. government giving up the last vestiges of its direct oversight of the World Wide Web and, more particularly, its unique avenue for exerting influence over the management of the → Read More
Prediction markets and other geopolitical forecasting methods are the stuff of science, finance, and statistics, not fantasy. Yet decision-makers in the U.S. government, except for the intelligence community, have yet to embrace experimentation with these types of markets. → Read More
A commonly cited statistic about private ownership of U.S. infrastructure has popped up again after the Colonial Pipeline ransomware report. But where does it actually come from? → Read More
All three of President Biden’s picks for the top cyber positions in his administration are excellent choices. It would have been better, however, if one of them had experience more rooted in the private sector. → Read More
Enterprises can manage, mitigate and monitor their cyber risks by mapping threats and adversary tactics, techniques and procedures to known vulnerabilities. Ultimately, the goal is to have a scalable, reproducible metric for risk. → Read More
Trump’s assault on the result of a democratic election is a far graver threat than Clinton’s perjury. But both are crimes of national significance. → Read More
Congress may soon consider whether or not to create a Bureau of Cyber Statistics. They should do so in a manner that gives the new bureau sufficient authority and capability to create a new, effective federal statistical agency. The implementing legislation will need to resolve several practical questions, which we review here. → Read More
Cybersecurity meets the insurrection. → Read More
As is my annual custom, this song is both thanks to all those who serve our country and a reminder of why they serve—to "secure the blessings of liberty." This year, with so much strife in the world, it seems worth remembering those who sacrifice for our nation. My best wishes to all Lawfare readers for a warm and wonderful holiday season and a happy new year. → Read More
How, if at all, can users be confident that the systems on which they rely will function as they are supposed to? → Read More
The Cyberspace Solarium Commission recommended that Congress establish a Bureau of Cyber Statistics. How should this body be organized? → Read More
In 2016, I thought that the U.S. decision to relinquish the last vestiges of its stewardship over the internet was a mistake. Now, I suspect I was wrong. → Read More
What should be done in a post-Trump world to restore the rule of law? → Read More
Bannon arrest is latest in a long line of criminal charges involving Trump confidants. This level of criminality surrounding a president is unparalleled. → Read More