It’s worth inserting some technical realities into the debate over whether the United States and its allies should or shouldn’t allow acquisition of Huawei 5G technology for use in communications infrastructure.
Latest in Cybersecurity
According to a criminal complaint filed in the U.S. District Court for the Southern District of Florida, Secret Service agents at President Trump's Mar-a-Lago resort in Florida arrested a woman who allegedly attempted to enter the resort carrying two Chinese passports along with four cell phones, a laptop, an external hard drive and a thumb drive containing malware. The woman, identified as Yujing Zhang, was charged with making false statements and trespassing.
Failure by governments to agree on international cyber norms has left a vacuum that tech firms such as Microsoft aim to fill.
The document offers one of the clearest policy positions articulated yet by any national government.
The new U.S. Cyber Command vision and the Department of Defense Cyber Strategy embody a fundamental reorientation in strategic thinking.
For elections to work, it is not sufficient that they produce an accurate tally of the votes cast. They must also convince the public that the tally is accurate.
True or not, Bloomberg’s recent stories about Chinese supply-chain attacks should sound the alarm for the government to shore up its procurement policies.
The International Committee of the Red Cross can serve as a model for a new international organization that would provide neutral, impartial and independent assistance to entities affected by serious cyberattacks.
Bloomberg reports that the Chinese People’s Liberation Army has quietly been corrupting a key computer chip. The technical implications are frightening.
In responding to a series of inquiries from the opposition party, the German government has clarified its position on international law in cyberspace—but questions remain.