Today’s news roundup features Shane Harris of the Wall Street Journal, Brian Egan, and Alan Cohn discussing stories that Shane wrote last week.
DayZero: Cybersecurity Law and Policy
DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.
For the bulk of internet users, the WPA2 vulnerability is a non-issue.
Sometimes we are reminded that the "noise" of policy drowns out important practical news. Today is one of those days. While we sit around worrying about Harvey Weinstein and Trump's latest tweet, it turns out that the encryption protocol at the core over almost all WiFi is vulnerable to attack.
It’s far more grave than one compromised NSA contractor.
The Cyberlaw Podcast: North Korea’s Chances of Winning a 2040 Gold Medal in Basketball May Be Better than You Think
Richard Danzig, former Navy Secretary and a serious defense and technology thinker, speaks to us about the technology tsunami and what it means for the Pentagon. Among the risks: lots more accidents, some of them catastrophic, and “emergent” interactions among systems that no one predicts or prepares for. He calls for the Department of Defense to spend more time thinking about ways in which our weapons might kill us without any enemy action.
The U.S. needs a more robust legal campaign to prevent China’s growing body of cybersecurity regulations from disrupting international business data flows.
Episode 182 features a panel of experts on attribution of cyberattacks. I moderated the panel at the Georgia Tech 15th Annual Cyber Security Summit in Atlanta on September 27, 2017. Panel members included Cristin Goodwin of Microsoft, Rob Knake of the Council on Foreign Relations, Hannah Kuchler of the Financial Times, and Kim Zetter, author of a 2014 book on the Stuxnet attack.
Subscribe to DayZero: Cybersecurity Law and Policy via RSS.