Lawfare Blog Cybersecurity Logo

Lawfare Blog – Cybersecurity

As our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. From criminals’ stealing credit card and social security number information to foreign governments’ hacking into American companies’ information systems, cyber attacks can take on myriad forms, prompting the government to formulate new measures to protect online security. Since cyberwarfare knows no territorial bounds, ensuring cybersecurity will also require international cooperation and an updated understanding of jus ad bellum, as it applies to cyber attacks.

Read More

DayZero: Cybersecurity Law and Policy

DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.

Read More
Krebs on Security

The Market for Stolen Account Credentials

Krebs on Security, December 18, 2017
By Brian Krebs

“Today’s post looks at the price of stolen credentials for just about any e-commerce, bank site or popular online service, and provides a glimpse into the fortunes that an enterprising credential thief can earn selling these accounts on consignment.”

Read More
Krebs on Security

The Value of a Hacked Email Account

Krebs on Security, July 10, 2013
By Brian Krebs

“This post aims to raise awareness about the street value of a hacked email account, as well as all of the people, personal data, and resources that are put at risk when users neglect to properly safeguard their inboxes. ”

Read More
Krebs on Security

The Value of a Hacked Company

Krebs on Security, July 14, 2016
By Brian Krebs

“If you help run an organization, consider whether the leadership is investing enough to secure everything that’s riding on top of all that technology powering your mission: Chances are there’s a great deal more at stake than you realize.”

Read More