Is it Time for a National Cybersecurity Safety Board?
Abstract In the wake of a series of destabilizing and damaging cyber attacks ranging from Equifax to Yahoo!, there has been a growing call for the U.S. governm…
Abstract In the wake of a series of destabilizing and damaging cyber attacks ranging from Equifax to Yahoo!, there has been a growing call for the U.S. governm…
Security vulnerabilities in technology extend well beyond problems with software. Earlier this month, researchers revealed that the hardware at the heart of nea…
This piece is exerpted from the Law, Borders, and Speech Conference Proceedings Volume. The conference, convened by Stanford's Center for Internet and Socie…
"Kristen Eichensehr, an assistant professor at UCLA School of Law who specializes in cybersecurity issues, said the Europeans begin any privacy discussion…
The Trump Administration this week formally accused the North Korean government of responsibility for the WannaCry ransomware attacks that hobbled hundreds of t…
"According to Andrea Matwyshyn, professor of law and computer science at Northeastern University, if companies help cyber criminals make money off hacks, t…
"Andrea Matwyshyn, a professor of law and computer science at Northeastern University, said that unless the owner or operator of a system specifically auth…
This paper proposes a conceptual lens for analysing organisational cybersecurity challenges in light of ‘firm size’. There is extensive literature in the fields…
Hackers around the world are attacking targets as diverse as North Dakota’s state government, the Ukrainian postal service and a hospital in Jakarta, Indonesia.…
Rep. Tom Graves (R-GA) and Rep. Kyrsten Sinema (D-AZ) introduced the Active Cyber Defense Certainty Act (H.R. 4036) in the House of Representatives on Oct. 13.…
""Contrary to Rosenstein's inflammatory digs, strong encryption does help prevent crime, such as identity theft -- something 'responsible'…
"Professor Brett Frischmann at Villanova University states, "the problem some companies face with self-dealing by IT professionals is complex because…