To The Next President: Get A National Cybersecurity Strategy

In the first presidential debate, since cybersecurity is rarely a topic for political debate, I was surprised when moderator Lester Holt questioned the candidates about cybersecurity strategy. Specifically, Holt asked, “We want to start with a 21st century war happening every day in this country. Our institutions are under cyber-attack, and our secrets are being…

Hackers Are Having Field Day on China’s Wild Web

The typical image of Chinese hackers is of operatives working for or with the tacit approval of the government, targeting valuable or sensitive data at foreign companies or government agencies. While there are plenty of those, many in China—like hackers elsewhere—also target the laptop of their ex-boss or the smartphone of the guy in front…

DOD Updates Cybersecurity Reporting Rule for Contractors

Oct. 4 — Defense contractors and subcontractors have a new definition of “covered defense information” to contend with as they follow mandatory reporting requirements for cybersecurity incidents, under a final rulepublished Oct. 4 (81 Fed. Reg 68,312, 10/4/2016). The new definition, announced in a final rule for the Defense Department’s Defense Industrial Base (DIB) Cybersecurity (CS)…