Policy

February 03, 2017
Cybersecurity Interrupted
blog-author-image
Posted By:
Categories :

We brought together a great group of experts with backgrounds in academia, government, and industry to discuss some of the most important foreign and domestic cybersecurity policy issues.

January 06, 2017
Reflections on Grizzly Steppe
blog-author-image
Posted By:
Categories :

On December 29, 2016, the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a joint analysis report (JAR) detailing, in their words, “tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities”.

December 29, 2016
Today's Statement on Russian Hacking in Context
blog-author-image
Posted By:
Categories :

On October 7, 1996, the Pentagon publicly attributed – without repercussions – a vast digital data breach and espionage to the Russians, later dubbed Moonlight Maze.  Fast forward twenty years to the date, and President Obama publicly attributed the DNC digital attacks to Russia.

December 15, 2016
The Global Trend Toward Cyber Sovereignty
blog-author-image
Posted By:
Categories :

2016 may well be the year of cyber sovereignty, with increased censorship and a decline in internet freedoms. China and Russia each pushed forth new domestic controls, with many others following in their steps. This threatens the global pursuit of internet freedoms, and may be indicative of a larger inflection point toward the Balkanization of the internet.

October 10, 2016
It's Time for Cyber Policy to Leapfrog to the Digital Age
blog-author-image
Posted By:
Categories :

It is time for our policies to catch up with modern realities, and move beyond decades of little to no recourse for cyber attacks.

America Is Losing the Cyber War

Russia, China, Iran and North Korea have a tactical edge against U.S. digital restraint.

Influencers: Calling it 'critical infrastructure' won't protect the vote

Designating the US electoral system critical infrastructure will not protect American democracy from hackers, said 62 percent of Passcode’s Influencers.

Shadow Brokers, digital attacks, and the escalation of geopolitical conflict

Last week’s data dump by the Shadow Brokers has left many wondering how the US will respond.

Rise in State-sponsored Cyber Espionage: The Tipping Point of Cyber Warfare?

It is tempting to suggest that if this is the case, why inflame the situation by creating warfare through defining warfare? But there is another body of opinion that sees positive merit in defining cyber warfare: it would paint a red line that must not be crossed without fear of serious reprisal from the world's most powerful nation. In this sense, the definition of cyber war has a deterrent effect against its use.

August 09, 2016
Vegas Hacker Summer Camp 2016: Mind the Gap
blog-author-image
Posted By:
Categories :

Last week's BSidesLV, Black Hat and Defcon conferences all demonstrated pheonomenal technical achievements, but gaps clearly remain. When measured against CNAP objectives, the conferences still have gaps in outreach and collaboration with policy, as well as a diversity of perspectives. That is, the industry requires a greater diversity of perspectives to compliment the current phenomenal domain expertise, and help overcome some of today’s greatest challenges in security.

Pages