The Role of Norms in Internet Security: Reputation and its Limits
|
|
WIRED |
China Tests the Limits of Its US Hacking Truce
WIRED For the most part, he says he's seen China's hacking groups shift their targeting to their own region, and move from pillaging US companies for intellectual property theft to a focus on traditional government-focused espionage, which falls outside the … |
JD Supra (press release) |
Litigation Alert: The Fourth Circuit Limits Standing to Bring Data Breach Cases
JD Supra (press release) The U.S. Court of Appeals for the Fourth Circuit has made it more difficult to establish Article III standing in data breach cases both at the pleading stage and at summary judgment by requiring plaintiffs to allege and show that data thieves … |
Limits of cyber warfare noted
Tribune-Review Calculations about military strategy come down to costs and rewards, said Martin Libicki, a cyber security expert at Rand Corp. in Arlington, Va. He is a chapter contributor to the report, “Cyber War in Perspective: Russian Aggression Against Ukraine.”. |