-
The clear threat of right-wing extremism demonstrates the need for a broad-based approach to CVE.
-
Your weekly summary of everything on the site.
-
Lawfare’s daily roundup of national security news and opinion
-
On Mar. 10, the FBI’s Cyber Division released a Private Industry Notification (PIN) warning that “Malicious actors almost certainly will leverage synthetic content for cyber and foreign influence operati...
-
-
Republican Governor Ron DeSantis has promised that Florida will soon enact “the most ambitious reforms yet proposed” for “holding ‘Big Tech’ accountable.” There’s just one problem: It’s unconstitutional.
-
If the SolarWinds/Holiday Bear campaign was a minimally invasive arthroscopic incision into vulnerable networks, the Microsoft Exchange hack was a full-limb amputation: untargeted, reckless and extremely...
-
The rule of sovereignty that France asserts applies to cyberspace is incompatible with several of its own operations. The “purist” approach to a rule of sovereignty for cyber operations is at odds with t...
-
Lawfare’s daily roundup of national security news and opinion
-
-
-
Closing vulnerabilities in the postal system is a necessary first step to address the opioid epidemic.