Cyber

× Clear Filters
357 Articles
Just Security

OPM, CISA, and the Cybersecurity Oxymoron

In Congress, bad policy ideas are like vampires: They are very hard to kill because they’re always somehow coming back from the dead. Such is the case with this year’s iteration…
Just Security

The OPM Hack and the New DOD Law of War Manual

Last Friday was a big day in cybersecurity news. OPM announced that, in addition to the compromise of the personnel information of federal employees revealed on June 4, Chinese…
Just Security

One More Reason for Companies to Report Data Breaches

Trust. And benefits. Those are two key issues impacting effective cybersecurity collaboration: whether companies and their legal advisors trust the government enough to reach out…
Just Security

DOJ Guidance on Cybersecurity Carrots and Sticks

In a speech yesterday to the annual Cybersecurity Law Institute, Assistant Attorney General Leslie Caldwell showed how far the Department of Justice has come in its dealings with…
Just Security

Rebooting DOD’s Cyber Strategy

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

The Cyber Sanctions Executive Order: What Will It Do and Will It Work?

In an Executive Order issued yesterday, the White House established a new sanctions regime for “significant malicious cyber-enabled activities,” including harming or impeding…
Just Security

The Right Way to Share Information and Improve Cybersecurity

This year is turning out to be a banner one for flawed proposals that would allow businesses to share information about Americans’ online activity with the Department of Homeland…
Just Security

Preparing for Cyber War: A Clarion Call

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Cybersecurity in the Intelligence Community’s 2015 Worldwide Threat Assessment

Last week Director of National Intelligence James Clapper released the 2015 Worldwide Threat Assessment of the US Intelligence Community and testified about it before the Senate…
Just Security

International Cyber Governance: Engagement Without Agreement?

The following post is the latest installment of  our Monday Reflections feature in which a different Just Security editor takes an in-depth look at the big stories from the…
Just Security

Cybersecurity and a New Era of Asymmetric Economic Warfare

In the last two decades, and in particular after the 9/11 attacks, the United States and its allies have had a near-monopoly on the use of coercive economic measures (sanctions,…
Just Security

Is it Possible to Ban Autonomous Weapons in Cyberwar?

Political and technological developments have often spurred responses from international humanitarian law (IHL). We already have a good sense of the major questions on the agenda…
1-12 of 357 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: