Cybersecurity
Enforcement of Cybersecurity Regulations: Part 2
While a valuable part of a cybersecurity program, “third-party audits” are too often not audits and not done by true third parties.
As our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. From criminals' stealing credit card and social security number information to foreign governments' hacking into American companies’ information systems, cyber attacks can take on myriad forms, prompting the government to formulate new measures to protect online security. Since cyberwarfare knows no territorial bounds, ensuring cybersecurity will also require international cooperation and an updated understanding of jus ad bellum, as it applies to cyber attacks.
Latest in Cybersecurity
While a valuable part of a cybersecurity program, “third-party audits” are too often not audits and not done by true third parties.
As government policy moves toward more binding rules for cybersecurity, how should they be enforced? Self-assessment and self-certification are not likely to suffice.
The third annual Cybersecurity Law and Policy Scholars Conference (CLPSC) will take place at the Fletcher School of Law & Diplomacy at Tufts University on September 29-30, 2023.
A new white paper from American University Washington College of Law’s Technology, Law, and Security Program considers how to combat the evolving ransomware threat in line with the Biden administration’s new National Cybersecurity Strategy.
Although the strategy builds on cybersecurity efforts from the previous three administrations, it departs from past perspectives and practices and, if fully implemented, has the potential to change the U.S. cybersecurity posture significantly for the better.
The Biden administration’s cybersecurity strategy calls for placing responsibility for buggy software on those best positioned to reduce risk. It’s high time, but it won’t be easy.
The long-awaited National Cybersecurity Strategy seeks to make fundamental changes to underlying dynamics of the digital ecosystem.
The United States and United Kingdom have issued joint sanctions against members of Trickbot, the first sanctions of their kind from U.K. authorities.
A new volume edited by Bobby Chesney and co-authors reconceptualizes instability in relation to cyberspace.
The Justice Department announces a successful campaign countering ransomware attacks by the Hive cybercriminal network.