Ransomware, the Colonial Pipeline, and U.S. Infrastructure
THE BLOG
- Dec 2, 2020
- 2 min
Tiktok is the Least of our Concerns—A Look at Data Brokers
- Sep 28, 2020
- 4 min
How TikTok Became the Center of a Data Privacy Showdown
- Apr 13, 2020
- 6 min
Why Geofencing Violates the Fourth Amendment Post-Carpenter
- Mar 9, 2020
- 3 min
Hey Alexa, Who Hacked my Phone? Jeff Bezos’ Cellphone Hack’s Implications on National Cybersecurity
- Mar 5, 2020
- 3 min
The Use of Big Data Against International Terrorism
- Dec 2, 2019
- 7 min
Balancing Security & Privacy of Electronic Border Searches
- Oct 30, 2019
- 3 min
Facebook, China, and The Cryptocurrency Race
- Oct 16, 2019
- 2 min
The Rise of Facial Recognition Technology in Airports
- Sep 23, 2019
- 3 min
Legal Means to Prosecute Actors Behind Deepfakes
- May 22, 2019
- 2 min
What Individual Rights Apply For A Telepathic Future?
- Apr 9, 2019
- 4 min
Lighting the Way for the Next “Going Dark” Encryption Battle
- Apr 6, 2019
- 3 min
Giving Cyberwar a Geneva Convention
- Mar 12, 2019
- 3 min
The Looming Threat to the 2020 Election
- Feb 27, 2019
- 3 min
Anticipating the Emergence of Disruptive Technology
- Feb 25, 2019
- 4 min
Watch Your SIM: SIM Swapping and Cryptocurrency Theft
- Nov 27, 2018
- 3 min
Election Security in an Age of Electoral Cyber Warfare
- Nov 19, 2018
- 3 min
Defending Against the Threat of Cyber Attacks and Its Legal Implications
- Oct 14, 2018
- 3 min
The OPM Data Breach: Implications for Covert Employees
- Nov 18, 2017
- 4 min
Critical Questions for the Critical Infrastructure Designation for Financial Services