Sometimes we are reminded that the "noise" of policy drowns out important practical news. Today is one of those days. While we sit around worrying about Harvey Weinstein and Trump's latest tweet, it turns out that the encryption protocol at the core over almost all WiFi is vulnerable to attack.
Latest in Cybersecurity
It’s far more grave than one compromised NSA contractor.
The U.S. needs a more robust legal campaign to prevent China’s growing body of cybersecurity regulations from disrupting international business data flows.
The Trump administration downgraded the State Department's cyber diplomacy office, and nobody can say whether State has produced a report on cyber strategy required by the president's cybersecurity executive order. Are the two related?
A supplier of cyber defense systems to the U.S. military has allowed the Russian government to review the source code for the defense system. That seems a bit unwise...
Our electoral infrastructure consists of two distinct pieces (or so it seems to me): a broader public context in which elections occur and a narrower system of election management. To date, almost everything we know about Russian electoral interference has dealt with the larger broader context—fake news, Russian troll factories, the hack of the DNC and other efforts to spread disinformation. As
This morning, the Kenyan Supreme Court announced it cancelled last month’s presidential election and ordered a new election within 60 days.
Open-source systems are only one step towards guarding our votes against manipulation—and the hypothesis that using open source software will by itself improve security is questionable at best.
What if the Russian FSB were responsible for defining the ISO standards for blockchain technology?
The Government Accountability Office last week published a report that, among other things, weighs in on the pros and cons of the NSA/CYBERCOM “dual-hat” system (pursuant to which the director of the NSA/CSS and commander of CYBERCOM are the same person). The report deserves attention but also some criticism and context. Here’s a bit of all three.
1. What is the “dual-hat” issue?