Schneier on Security - Masthead

Schneier on Security – “Crypto-Gram” Newsletter

I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I’m a Special Advisor to IBM Security, a fellow and lecturer at Harvard’s Kennedy School, and a board member of EFF. This personal website expresses the opinions of none of those organizations.

Schneier on Security – “Crypto-Gram” Newsletter Read More
Thou Shalt Not Depend on Me

Thou Shalt Not Depend on Me

“Most websites use JavaScript libraries, and many of them are known to be vulnerable. Understanding the scope of the problem, and the many unexpected ways that libraries are included, are only the first steps toward improving the situation. The goal here is that the information included in this article will help inform better tooling, development practices, and educational efforts for the community.”

Thou Shalt Not Depend on Me Read More
CyberLaw Podcast Logo

CyberLaw Podcast

The Cyberlaw Podcast is a weekly interview series and discussion on the latest events in technology, security, privacy, and government. The podcast is hosted by Steptoe & Johnson LLP partner Stewart Baker, who is joined by a wide variety of guests including academics, politicians, authors, and reporters. You can subscribe to the podcast here. It is also available on iTunes, Google Play, Spotify and other podcast platforms.

CyberLaw Podcast Read More
Lawfare Blog Cybersecurity Logo

Lawfare Blog – Cybersecurity

As our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. From criminals’ stealing credit card and social security number information to foreign governments’ hacking into American companies’ information systems, cyber attacks can take on myriad forms, prompting the government to formulate new measures to protect online security. Since cyberwarfare knows no territorial bounds, ensuring cybersecurity will also require international cooperation and an updated understanding of jus ad bellum, as it applies to cyber attacks.

Lawfare Blog – Cybersecurity Read More

DayZero: Cybersecurity Law and Policy

DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.

DayZero: Cybersecurity Law and Policy Read More