Federal, state authorities investigating source of data used to steal city employees' tax returns
""They're related, as far as we know, only by the fact that they're city employees," said Richard Forno, assistant director of the Univer…
""They're related, as far as we know, only by the fact that they're city employees," said Richard Forno, assistant director of the Univer…
Abstract: Rarely does a day seem to go by without another front page story about a firm being breached by cyber attackers. Even experts in the field are far fr…
Last week, at an event co-hosted by Just Security and NYU’s Brennan Center for Justice, the NSA’s Civil Liberties and Privacy Director Rebecca Richards dropped…
In August 2015, I had the good fortune to present at the New York State Emergency Management Certification and Training (EMC&T) Academy in Albany, NY. The…
More nations in the Asia-Pacific are adopting a bottom-up approach to cybersecurity regulation. That’s a good thing, Scott Shackelford writes. Cybersecurity is…
"While some proponents of both have laudable goals–protecting the intellectual property of innovators and building intelligence that can save lives–the dan…
"Duo Security, a cloud-based trusted access provider protecting the world's largest and fastest-growing companies, today announces winners for its Wome…
A Review of Adam Segal's The Hacked World Order (PublicAffairs, 2016). There have been many books written on cybersecurity over the last several years—this…
"“Health care is a particularly vulnerable sector with respect to cyber security,” said Jeffrey Vagle, a lecturer in law at the University of Pennsylvania…
"Many of the most important developments have had a Eurocentric flavor to them. For instance, the European Court of Justice in October 2015 struck down the…
Scott Shackelford Indiana University - Kelley School of Business - Department of Business Law; Stanford Law School; Hoover Institution, Stanford University; Ce…
Although much work has been done on applying the law of warfare to cyber attacks, far less attention has been paid to defining a law of cyber peace applicable b…