-
One thing I love about the various annual authorization bills is that they often contain very interesting but little-noticed provisions. The Intelligence Authorization Act for Fiscal Year 2016, which HP...
-
Press reports today (New York Times,
-
Russia Trolls the Net — A fascinating, must read report from the NY Times: “From a nondescript office building in St.
-
According to this report fro
-
I’d like to announce the new Journal of Cybersecurity, an interdisciplinary journal encouraging submissions in all aspects of cybersecurity. This new journal will publish original research in the inheren...
-
I’d like to announce the new Journal of Cybersecurity, an interdisciplinary journal encouraging submissions in all aspects of cybersecurity. This new journal will publish original research in the inheren...
-
This past week, the NATO Cooperative Cyber Defense Center of Excellence put on its annual Cyber Conflict conference in Tallinn, Estonia. The conference boasted a number of experienced cyber-hands, includ...
-
Science tends to take us places where policy cannot follow. Policy tends to take us places where science cannot follow. Yet neither science nor policy can be unmindful of the other. Here I will confine m...
-
Logjam is a new attack against the Diffie-Hellman key-exchange protocol used in TLS. Basically:
The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit ex...
-
I haven't watched this yet, but it took place yesterday at Georgetown Law's Cybersecurity Law Institute. Ben Powell, former general counsel to the DNI, interviews Jim Comey:
-
The University of Adelaide has a free new MOOC called Cyberwar, Surveillance and Security that is taught by Melissa de Zwart, Dale Stephens, and Rebecca LaForgia. The web page and registration can be f...
-
It's a crowded field for Republican presidential candidates, but Lindsey Graham knows how to differentiate himself from the pack: he loves drone strikes more than his competitors.
Speaking the other nig...