Cybersecurity

Publications

, CyberScoop
Security fears over antitrust legislation raise looming questions about a federal privacy law
Brandon Pugh

From CyberScoop:

“Expanding access to data is a challenge,” said Brandon Pugh, cybersecurity and emerging threats policy counsel at the R Street Institute. “And the reason it’s a challenge…

The Ignored Aspects of the Senate’s Antitrust Effort: Cybersecurity and Privacy
Tatyana Bolton & Brandon Pugh

Our last explainer focused on the American Choice and Innovation Online Act (H.R.3816) and Augmenting Compatibility and Competition by Enabling Service Switching Act of 2021 (H.R.3849). This…

, Lawfare Blog
Podcast: The Cyberlaw Podcast: The FTC Jumps Into Log4j Cleanup With One Foot
Tatyana Bolton

From Lawfare Blog:

The Federal Trade Commission’s (FTC) other foot, I argue, is lodged firmly in its mouth. Tatyana Bolton defends the agency, which released what can only be described as a…

Betting on Cyber: Offering an Analytical Framework for a Cybersecurity Crowd-Forecasting Platform
Mary Brooks & Paul Rosenzweig

Introduction
Our two previous posts on the Lawfare Blog addressed a series of questions. In our first post, we offered an overview of the current ecosystem of prediction markets and…

Learning from Cyber Incidents – Adapting Aviation Safety Models to Cybersecurity
Paul Rosenzweig

From Belfer Center for Science and International Affairs:

In 2018, Paul Rosenzweig at the R Street Institute published a short paper on the topic, [10]

 

[10] Paul Rosenzweig, The NTSB…

, Forbes
The Urgent Need For Cybersecurity To Diversify
Jumoke Dada

From Forbes:

For instance, the #ShareTheMicInCyber project aims to amplify the role of Black professionals in the sector, while #MakingSpace aims to improve the diversity at cybersecurity…

How Governments Can Secure Hybrid Networks from Ransomware
John Bansemer & Greg Rattray & Franklin Lee

From Government Technology Magazine:

In 2020, more than 70 state and local governments fell victim to ransomware as the frequency of attacks rose by 485 percent from the year before. From metro…

Technological illiteracy is about more than zeros and ones
Mary Brooks & Sofia Lesmes

If you open almost any web page and right click, you’ll see an option to view the HTML source code.  Click on that option. Congratulations: by doing so, you could now be facing criminal…

Radio: Strategies for managing all that cybersecurity related data your networks generate
Bryson Bort

From The Federal Drive with Tom Temin:

Cybersecurity and data management are closely linked. That’s why many agencies are refining their strategies for gathering and managing large stores or…

, Lawfare
Three Key Questions to Define ICT Supply Chain Security
Tatyana Bolton & Mary Brooks & Kathryn Waldron

On July 15, the Senate Committee on Commerce, Science, and Transportation held a hearing to discuss how to bolster the security and resiliency of America’s critical supply chains.

Thankfully,…

Secured By miniOrange