Must Read

CRS: Federal Laws Relating to Cybersecurity

Author: Eric A. Fischer

The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.

See more in United States; Cybersecurity

Primary Sources

Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program

The foreward of this National Science and Technology Council strategy document, written by John P. Holdren (Assistant to the President for Science and Technology and Director, Office of Science and Technology Policy) states,

"This report, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program was developed by the NITRD agencies and directly responds to the need for a new cybersecurity R&D strategy. As recommended in the CyberspacePolicy Review's near-term action plan, Trustworthy Cyberspace replaces the piecemeal approaches of the past with a set of coordinated research priorities whose promise is to "change the game," resulting in a trustworthy cyberspace. As called for in the policy review's mid-term action plan, this plan identifies opportunities to engage the private sector in activities for transitioning promising R&D into practice. In addition, and consistent with the PCAST recommendations, it prioritizes the development of a "science of security" to derive first principles and the fundamental building blocks of security and trustworthiness.

I am pleased to commend this Federal cybersecurity R&D strategic plan as part of the Administration's comprehensive effort to secure the future of the Nation's digital infrastructure."

See more in Cybersecurity; United States

Must Read

Vanity Fair: Enter the Cyber-dragon

Author: Michael Joseph Gross

Hackers have attacked America's defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. Michael Joseph Gross gets an exclusive look at the raging cyber-war--Operation Aurora! Operation Shady rat!--and explains why Washington has been slow to fight back.

See more in China; United States; Cybersecurity


Cybersecurity and the Private Sector

Interviewer: Adam Segal
Interviewee: Edward Amoroso

AT&T's Chief Security Officer, Edward Amoroso, discusses the recent spate of cyberattacks and how governments and the private sector can help protect infrastructure and prevent future attacks with Adam Segal, Ira A. Lipman Senior Fellow for Counterterrorism and National Security Studies at the Council on Foreign Relations.

See more in Cybersecurity; Global