Our guest interview is with Nick Weaver, of Berkeley’s International Computer Science Institute. It covers the latest dumps of hacker tools, the vulnerability equities process, the so-bad-you-want-to-cover-your-eyes story of Juniper and the Dual_EC hacks, and ends with a tour of recent computer security disasters.
DayZero: Cybersecurity Law and Policy
DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.
Proposals to establish international norms against intruding against other nations' critical infrastructures fail to recognize that while few nation-states want to cause massive systemic risk, nobody can agree on what constitutes systemic risk or what trade-offs are worth what level of risk of a calamitous event.
Episode 157 digs into the security of the medical internet of things. Which, we discover, could be described more often than we’d like as an internet of things that want to kill us.
This is the final installment in a three-part series on Judge Neil Gorsuch’s cyber-related decisions from the Tenth Circuit.
An overview of recent developments affecting U.S.-China cross-border digital trade.
This is the second part of a three-part series on Judge Neil Gorsuch’s handling of cyber issues. In this collection of cases, Judge Gorsuch identifies the uniqueness of computer searches and the accompanying safeguards, and examines potentially faulty databases.
Our interview is with Michael Daniel, former Special Assistant to the President and Cybersecurity Coordinator at the White House and current President of the Cyber Threat Alliance. Plus, Wikileaks, forgetting passwords, end-to-end encryption, and GCHQ.
Subscribe to DayZero: Cybersecurity Law and Policy via RSS.