Private Sector and Government Collaboration on Cybersecurity: The Home Depot...
Last week, I spoke to two groups of chief information security officers (CISOs). While I went in to talk about some of the information sharing initiatives I worked on while I was in government, I was...
View ArticleEurope v. Google: A Dispute About Competition, Political Power, and Sovereignty
The European Commission’s accusations that Google has violated EU competition law by abusing its dominant position in the Internet search market generated significant attention. This case is important,...
View ArticleFive Quick Takeaways From the First Two Days of the RSA Conference
The madness that is the RSA Conference is well underway. Here are five quick takeaways from the first day and a half: 1. We may be in San Francisco, but the center of the cybersecurity world is...
View ArticleThe Global Forum on Cyber Expertise: Its Policy, Normative, and Political...
The big idea emerging from the Global Conference on Cyberspace 2015—the latest iteration of the London Process—is the Global Forum on Cyber Expertise (GFCE). According to The Hague Declaration, the...
View ArticleThe Digital Single Market Strategy Will Complicate the Economic Relationship...
Today’s release of the European Union’s Digital Single Market Strategy starts a new era in digital diplomacy within the union and between the EU and the United States. The strategy identifies the ways...
View ArticleA Checklist Manifesto for Cybersecurity
As I continue to do my part to evangelize the NIST Cyber Framework, the most common criticism I hear is that it is nothing more than one big, long checklist. My initial response was to parrot back what...
View ArticleTaking Stock of Snowden’s Disclosures Two Years On
Last Friday marked the second anniversary of the start of Edward Snowden’s disclosures. The days preceding this anniversary highlighted Snowden’s continued prominence. On June 1, Section 215 of the USA...
View ArticleThe Policy Implications of Hacking the Hacking Team
The irony of Hacking Team—an Italian company that sells surveillance software—being hacked (or as Wired put it, “disemboweled”) is delicious, especially given Hacking Team’s denials it sold to...
View ArticleLegislative Proposals on Terrorist Use of Social Media Raise Policy and Legal...
On June 16, the House of Representatives passed an Intelligence Authorization Act for Fiscal Year 2016, which requires the Director of National Intelligence (DNI) to produce a report on terrorist use...
View Article
More Pages to Explore .....