Cyber
357 Articles

OPM, CISA, and the Cybersecurity Oxymoron
In Congress, bad policy ideas are like vampires: They are very hard to kill because they’re always somehow coming back from the dead. Such is the case with this year’s iteration…

The OPM Hack and the New DOD Law of War Manual
Last Friday was a big day in cybersecurity news. OPM announced that, in addition to the compromise of the personnel information of federal employees revealed on June 4, Chinese…

One More Reason for Companies to Report Data Breaches
Trust. And benefits. Those are two key issues impacting effective cybersecurity collaboration: whether companies and their legal advisors trust the government enough to reach out…

DOJ Guidance on Cybersecurity Carrots and Sticks
In a speech yesterday to the annual Cybersecurity Law Institute, Assistant Attorney General Leslie Caldwell showed how far the Department of Justice has come in its dealings with…

Rebooting DOD’s Cyber Strategy
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

The Cyber Sanctions Executive Order: What Will It Do and Will It Work?
In an Executive Order issued yesterday, the White House established a new sanctions regime for “significant malicious cyber-enabled activities,” including harming or impeding…

The Right Way to Share Information and Improve Cybersecurity
This year is turning out to be a banner one for flawed proposals that would allow businesses to share information about Americans’ online activity with the Department of Homeland…

Preparing for Cyber War: A Clarion Call
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Cybersecurity in the Intelligence Community’s 2015 Worldwide Threat Assessment
Last week Director of National Intelligence James Clapper released the 2015 Worldwide Threat Assessment of the US Intelligence Community and testified about it before the Senate…

International Cyber Governance: Engagement Without Agreement?
The following post is the latest installment of our Monday Reflections feature in which a different Just Security editor takes an in-depth look at the big stories from the…

Cybersecurity and a New Era of Asymmetric Economic Warfare
In the last two decades, and in particular after the 9/11 attacks, the United States and its allies have had a near-monopoly on the use of coercive economic measures (sanctions,…

Is it Possible to Ban Autonomous Weapons in Cyberwar?
Political and technological developments have often spurred responses from international humanitarian law (IHL). We already have a good sense of the major questions on the agenda…