Showing 1 - 10 of 21
Persistent link: https://www.econbiz.de/10013207679
Firms have increasingly been turning to cyber risk insurance to better manage the cyber threat and any resulting legal liability from data breaches. But how useful is cyber risk insurance? This Article analyzes the impact of cyber attacks on firms, some of the applicable U.S. law shaping private...
Persistent link: https://www.econbiz.de/10014174937
Hackers have been online since a Cornell graduate student infected MIT’s burgeoning network with the first Internet worm on November 2, 1988. But recently cyber attacks on states have proliferated both in numbers and severity. The best-known recent example of such a cyber attack was on April...
Persistent link: https://www.econbiz.de/10014046013
Views range widely about the seriousness of cyber attacks and the likelihood of cyber war. But even framing cyber attacks within the context of a loaded category like war can be an oversimplification that shifts focus away from enhancing cybersecurity against the full range of threats now facing...
Persistent link: https://www.econbiz.de/10014166483
In the wake of a series of destabilizing and damaging cyber attacks ranging from Equifax to Yahoo!, there has been a growing call for the U.S. government to establish an analogue of the National Transportation Safety Board (NTSB) to investigate cyber attacks. Even the esteemed Center for...
Persistent link: https://www.econbiz.de/10014117130
Cybersecurity is an increasingly interdisciplinary field in which a range of perspectives including not only computer science but also the social sciences and the humanities, such as music, have an invaluable role to play in helping to train effective twenty-first century cybersecurity...
Persistent link: https://www.econbiz.de/10014119345
Having access to the internet is increasingly considered to be an emerging human right. International organizations and national governments have begun to formally recognize its importance to freedom of speech, expression, and information exchange. The next step to help ensure some measure of...
Persistent link: https://www.econbiz.de/10014120226
Although one segment of the proactive cybersecurity debate—e.g., hack back—has long been derided as a policy option carrying with it great risks of escalation, among other concerns, elements within the U.S. Congress and abroad are actively pushing to give companies a freer hand at defending...
Persistent link: https://www.econbiz.de/10014109417
There is a great deal of buzz surrounding the Internet of Things (IoT), which is the notion, simply put, that nearly everything not currently connected to the Internet from gym shorts to factories soon will be. The Industrial Internet of Things (IIoT) is one application of this trend and...
Persistent link: https://www.econbiz.de/10014111232
This Article analyzes State involvement in cybersecurity, particularly policies aimed at mitigating cyber threats below the armed attack threshold — cybercrime and espionage. Although the focus is on national cybersecurity strategies, related domestic follow-up initiatives are also considered,...
Persistent link: https://www.econbiz.de/10014134237