Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Real cybersecurity involves trade-offs in functional requirements. → Read More
What would be the impact of other cyber powers adopting U.S. Cyber Command’s Command Vision concepts in pursuing their own security interests? → Read More
Unknown knowns pose the most difficult problems for people and nations to address. → Read More
Unknown knowns pose the most difficult problems for people and nations to address. → Read More
Comparing the Biden administration’s Interim National Security Strategic Guidance with Trump’s National Cyber Strategy. → Read More
An attempt to sketch out the justification for a commission as well as the mandate, major areas of inquiry, and legislative language that are needed to guide this effort. → Read More
On Jan. 6, a large number of pro-Trump rioters occupied portions of the U.S. Capitol building to protest and disrupt the counting and certification of electoral votes from the November 2020 election. The significance of this event for American democracy, the rule of law, and the depths of extremism in the U.S. populace will be addressed by others but I am compelled to point → Read More
This siege has created potentially serious cyber risks for Congress and other affected offices. → Read More
The timeline of the breach is still unfolding, but it is not too early to offer a number of high-level observations and predictions. → Read More
Starlink is a space-based internet service provider that seeks to provide high-speed (40 mbps upload, 100 mbps download ), near-global coverage of the populated world by 2021—bringing this service to locations where access previously has been unreliable, expensive or completely unavailable. Starlink has publicized the space-based segment of its platform for some time, which → Read More
The Cyber Solarium Commission’s new white paper explores what the coronavirus can teach us about how to prepare for a major cyber attack. But it also highlights cybersecurity principles that would have been and are relevant to responding to the current pandemic. → Read More
The FBI and CISA are worried about intellectual property theft of coronavirus vaccines and treatments. But to develop cures quickly, the scientific community needs to think cooperatively. → Read More
As the House considers establishing alternatives to in-person voting during the pandemic, it must also provide confidence that a representative’s vote has not been hacked or compromised. → Read More
Globalization has left Western end-users at least partially dependent on capabilities and services provided by foreign vendors that may not be entirely trustworthy. → Read More
In a Wall Street Journal article, a senior Huawei official acknowledged the company has a significant capability. → Read More
When U.S. Cyber Command gets involved with psychological operations, what is the role of military psy-ops troops? → Read More
The New York Times reported on June 15 that “the United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin.” In particular, the Times reported that the United States has deployed code “inside Russia’s grid and other targets”—that is, “potentially crippling malware inside the Russian system, ... → Read More
Companies holding sensitive personal information on individuals have little incentive to improve their cybersecurity postures. Congress needs to act. → Read More
I don’t disagree with much that Alexei Bulazel, Sophia d’Antoine, Perri Adams and Dave Aitel wrote on Huawei and risk mitigation, and endorse almost all of their argument. → Read More
IT vendors are increasingly defining principles to guide the development of artificial intelligence. It’s worth taking a look at what those principles actually say. → Read More