Search
Searching Content indexed under Media, Telecoms, IT, Entertainment by Steptoe & Johnson LLP ordered by Published Date Descending.
Links to Result pages
 
1 2 3 4  
>>Next
 
Title
Country
Organisation
Author
Date
1
DoD Issues Final DFARS Rule Regarding Safeguarding Unclassified Controlled Technical Information And Cyber-Reporting
On November 18, 2013, the Department of Defense (DoD) issued a final rule, effective the same day, amending the Defense Federal Acquisition Regulation Supplement (DFARS) to impose requirements for safeguarding unclassified controlled technical information residing on contractor information technology systems and databases.
United States
9 Dec 2013
2
Europe, The Cloud, And The New York Times
The "New York Times" recently ran a story arguing that, after the Snowden revelations, Europe would have to build its own cloud computing industry to protect European privacy.
European Union
23 Oct 2013
3
How NISTís Cybersecurity Framework Could Reduce Cybersecurity
In my first post about NISTís draft cybersecurity framework I explained its basic problem as a spur to better security: It doesnít actually require companies to do much to improve their network security.
United States
15 Oct 2013
4
Whoís Afraid Of The NIST Cybersecurity Framework?
cyberattack, cybersecurity, Data security, hacking, network security, Personal Data, privacy
United States
15 Oct 2013
5
Is NIST Turning Weak Cybersecurity Standards Into Aggressive New Privacy Regulation?
Cyberattack, ybersecurity, Data security, hacking, network security, privacy, security
United States
15 Oct 2013
6
The CFAA And The Insider Threat
Rep. Zoe Lofgren recently introduced "Aaronís Law," legislation that would significantly amend the Computer Fraud and Abuse Act.
United States
9 Jul 2013
7
Overreacting To The AP Subpoenas
However well-intentioned, this bill is an extreme overreaction to the frenzy over DOJ having used a "secret" subpoena to obtain telephone records of AP reporters in a national security leak case.
United States
4 Jun 2013
8
Found: The PLAís University Of Hacking
A discussion the remarkable story about the identification of another Chinese hacker.
China
25 Feb 2013
9
White House Issues Executive Order On Improving Critical Infrastructure Cybersecurity
A discussion on President Obama recently signing an Executive Order on Improving Critical Infrastructure Cybersecurity.
United States
25 Feb 2013
10
They Really Donít Know Clouds At All
Every new computing technology seems to bring with it a privacy flap, and it is now the turn of cloud computing to be in the spotlight.
United States
18 Feb 2013
11
Corporate Network Defense: When Seconds Count, The FBI Is Years Behind
The Washington Postís Ellen Nakashima wrote another cutting-edge article on innovative approaches to network defense.
United States
8 Jan 2013
12
Prosecuting Cyberespionage - Justiceís New Strategy
The National Security Division of the Justice Department may be getting on the cyberspace attribution/retribution bandwagon ó and in the process, reshaping US strategy for deterring cyberespionage.
United States
31 Dec 2012
13
US Head Of Delegation At WCIT Badmouths Deep Packet Inspection
Itís been a contentious meeting in Dubai at the World Conference on International Telecommunications.
United States
18 Dec 2012
14
Finding Cyberspies
For a while now I believe that attribution of hacker attacks has been rapidly improving. Well now we have confirmation from a Ken Dilanian scoop in the LA Times.
United States
17 Dec 2012
15
More On Cybersecurity And Attribution: Si Chuan University And Tencent
Previously, I told the story of how Trend Micro identified "Luckycat," a Chinese hacker who had attacked the Dalai Lama, aerospace firms, and other targets.
United States
14 Dec 2012
16
Cyber Security
The Department for Business Innovation & Skills has produced new guidance about how to defeat most cyber attacks.
UK
13 Nov 2012
17
The Hackback Debate
The vulnerability of computer networks to hacking grows more troubling every year.
United States
13 Nov 2012
18
Good News For Cybersecurity And Attribution?
How should the US respond to massive state-sponsored cyberespionage? Right now, policymakers are intent on improving network security.
United States
10 Oct 2012
19
Sneak Peak Of The Cybersecurity Executive Order Draft
Federal News Radioís Jason Miller reports that heís seen a draft of the executive order on cybersecurity. What he describes is quite plausible:
United States
13 Sep 2012
20
OFAC Issues Guidance On Exports Of Personal Communications Services And Software To Iran
On March 20, 2012, the Treasury Departmentís Office of Foreign Assets Control (OFAC) issued interpretive guidance and a new licensing policy regarding its rule authorizing the export to Iran of certain services and software incident to the exchange of personal communications over the Internet.
United States
4 Apr 2012
Links to Result pages
 
1 2 3 4  
>>Next