Bloomberg reports that the Chinese People’s Liberation Army has quietly been corrupting a key computer chip. The technical implications are frightening.
Latest in Cybersecurity
In responding to a series of inquiries from the opposition party, the German government has clarified its position on international law in cyberspace—but questions remain.
The 2018 DOD Cyber Strategy: Understanding 'Defense Forward' in Light of the NDAA and PPD-20 Changes
The Pentagon’s 2018 Cyber Strategy document is drawing attention because of its reference to “defense forward.” What does that mean? Let’s have a close look, in context with the recently-enacted NDAA and recent changes to PPD-20.
We are fully back from our August hiatus, and leading off a series of great interviews, I talk with Bruce Schneier about his new book, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. Bruce is an internationally renowned technologist, privacy and security commentator, and someone I respect a lot more than I agree with.
How do we identify, understand and protect our most valuable AI assets?
Yesterday the Wall Street Journal’s Dustin Volz reported that President Trump has altered the interagency process for vetting offensive cyber operations. We do not have the full details yet, but it appears to be the culmination of long-running efforts to make it easier and quicker to conduct such activities. Here’s a roadmap of some of the key interests and issues at stake.
What the National Counterintelligence and Security Center Really Said About Chinese Economic Espionage
The 2015 Obama-Xi agreement on economic espionage does not prohibit all cyber-enabled theft of intellectual property.
A recent poll suggests the importance of not conflating the concepts of campaign “meddling” and cyber issue.
What DHS says about how the department is going to address the growing complexity of cyberthreats.