-
How Should the U.S. Respond to the SolarWinds and Microsoft Exchange Hacks?
If the SolarWinds/Holiday Bear campaign was a minimally invasive arthroscopic incision into vulnerable networks, the Microsoft Exchange hack was a full-limb amputation: untargeted, reckless and extremely... -
France, Cyber Operations and Sovereignty: The ‘Purist’ Approach to Sovereignty and Contradictory State Practice
The rule of sovereignty that France asserts applies to cyberspace is incompatible with several of its own operations. The “purist” approach to a rule of sovereignty for cyber operations is at odds with t... -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: Content Moderation and the First Amendment for Dummies
-
Commission Criticizes Lack of Preparedness; U.S. Likely to Implement Sweeping Rule on Tech-Related Transactions
-
The Biden Administration’s Opportunity to Secure International Mail
Closing vulnerabilities in the postal system is a necessary first step to address the opioid epidemic. -
Rational Security: The 'Happy Birthday, Remote Jungle Studio' Edition
-
Fault Lines: Supply Chains and Relationship Strains
The latest episode of Fault Lines -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: America's War in Afghanistan's Pech Valley
-
EU Privacy Law and U.S. Surveillance: Solving the Problem of Transatlantic Data Transfers
Most current approaches to resolving the EU-U.S. conflict fall short. It’s time for a hybrid approach. -
How Biden’s Cyber Strategy Echoes Trump’s
Comparing the Biden administration’s Interim National Security Strategic Guidance with Trump’s National Cyber Strategy.