Credit: Shutterstock

Cybersecurity Research for the Future

Nonetheless, while the dark side is daunting, emerging research, development, and education across interdisciplinary topics addressing cybersecurity and privacy are yielding promising results. The shift from R&D on siloed add-on security, to new fundamental research that is interdisciplinary, and positions privacy, security, and trustworthiness as principal defining objectives, offer opportunities to achieve a shift in the asymmetric playing field.

Read More
Logo - The White House - Barack Obama

Presidential Policy Directive 41 – United States Cyber Incident Coordination

While the vast majority of cyber incidents can be handled through existing policies, certain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts. These significant cyber incidents demand unity of effort within the Federal Government and especially close coordination between the public and private sectors.

Read More
Nakasone testifying in Washington, D.C., February 2019 - U.S. Cyber Command

How to Compete in Cyberspace

We learned that we cannot afford to wait for cyber attacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks. The threat evolved, and we evolved to meet it.

Read More
hand turning knobs on console - Credit: Getty Images

Why Is Cybersecurity Not a Human-Scale Problem Anymore?

In this Viewpoint, we show why cybersecurity is a very difficult problem. The enterprise attack surface is massive and growing rapidly. There are practically unlimited permutations and combinations of methods by which an adversary can attack and compromise our networks. There is a big gap between our current tools and methods, and what is needed to get ahead of cyber-adversaries.

Read More
Book Cover - Dark Mirror by Barton Gellman

Dark Mirror: Edward Snowden and the American Surveillance State

Edward Snowden touched off a global debate in 2013 when he gave Barton Gellman, Laura Poitras and Glenn Greenwald each a vast and explosive archive of highly classified files revealing the extent of the American government’s access to our every communication. They shared the Pulitzer Prize that year for public service. For Gellman, who never stopped reporting, that was only the beginning.

Read More
Cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.

Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.

Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. The third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020.

Read More