Cybersecurity

Recent Other Publications

Records 12 / 12

How to build NERC CIP compliance: a new course by the SANS Institute

June 2016

This post is a review of a five-day NERC Critical Infrastructure Protection (CIP) training being offered by the SANS institute.

Risk in Cyber Systems

December 2015

Currently, significant uncertainty surrounds cyber security investments.

Maneuvering The China-U.S. Relationship in Cyberspace

October 2015

The article examines the impact of the summit between President Obama and President Xi on future cybersecurity relations between the two countries, and the changing nature of cyber cooperation and...

Analysis of Pin and TPM for Microsoft Laptops

September 2015

Organizations routinely face risk trade-offs.

House Energy & Commerce Committee Testimony on Cyber Threats

March 2015

On Tuesday March 3, 2015, the Subcommittee on Oversight and Investigations held a hearing entitled, “Understanding the Cyber Threat and Implications for the 21st Century Economy.” This was the...

NSA's Creative Interpretations of Law Subvert Congress and the Rule of Law

December 2013

CISAC Affiliate and Forbes Contributor Jennifer Granick explains how NSA domestic surveillance activities might continue, even in the face of legal decisions to rein in the agency's activities. ...

What We Need to Know About PRISM

June 2013

On June 6, the National Security Agency acknowledged the existence of a massive public surveillance program, called PRISM.

Role of Economic Incentives in Securing Cyberspace, The

November 2004

In the last eight years, every significant public policy initiative to address the safety and security of U.S.

Civil Liberties and Security in Cyberspace

August 2000

Societies are becoming more dependent on computer networks and therefore more vulnerable to cyber crime and terrorism.

U.S. Military and Civil Infrastructure Protection: Restrictions and Discretion under the Posse Comitatus Act, The

November 1999

This article sets out the constraints of the Posse Comitatus Act of 1878 (the “Act”), which generally prohibits active enforcement of civilian laws by the military, and describes the discretion of...

High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century

May 1998

If high-performance computing (HPC) export control policy is to be effective, three basic premises must hold: There exist problems of great national security importance that require high...

Old Law for a New World? The Applicability of International Law to Information Warfare

February 1997

The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks,...

People

Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Herb Lin Herbert Lin Senior Research Scholar for Cyber Policy and Security
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Jesse Sowell Jesse Sowell Postdoctoral Fellow
Max Smeets Max Smeets Postdoctoral Fellow
Rachel Hirshman Rachel Hirshman CISAC Honors Student
Irving Lachow Irving Lachow Affiliate
Toomas Ilves Toomas Hendrik Ilves Distinguished Visiting Fellow, Hoover Institution
Carey Nachenberg Carey Nachenberg Affiliate
David Elliott Affiliate
Jennifer Granick Affiliate
Thomas Berson Affiliate