Header graphic for print
Steptoe Cyberblog

Monthly Archives: November 2016

Steptoe Cyberlaw Podcast – Interview with John Markoff

Posted in Cybersecurity and Cyberwar, Data Breach

The Autonomous Weapon Who Went to the Beach Episode 140 features long-time New York Times reporter, John Markoff, on the past and future of artificial intelligence and its ideological converse – the effort to make machines that augment rather than replace human beings.  Our conversation covers everything from robots, autonomous weapons, and Siri to hippie… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Paul Rosenzweig and Shane Harris

Posted in China, Cybersecurity and Cyberwar, Data Breach, Privacy Regulation

We couldn’t resist.  This week’s topic is of course President-elect Trump and what his election could mean for All Things Cyber.  It features noted cybercommentator Paul Rosenzweig and Daily Beast reporter Shane Harris.  In the news, we’re reminded of the old Wall Street saying that bulls and bears can both make money in the market… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Frank Cilluffo

Posted in Cybersecurity and Cyberwar, Data Breach

The episode features a vigorous and friendly debate between me and Frank Cilluffo over his Center’s report on active defense, titled “Into the Gray Zone.”  It’s a long and detailed analysis by the Center for Homeland and Cyber Security at GW University.  My fear: the report creates gray zones for computer defense that should not… Continue Reading

Three Recent Cybersecurity and Information Systems Management Rules Impact Government Contractors

Posted in Cybersecurity and Cyberwar, Security Programs & Policies

In the last two months, the federal government has issued a number of cybersecurity-related regulations that are or will be directly or indirectly applicable to a wide range of federal contractors and subcontractors, and more rules are expected. The three recent rules discussed here on controlled unclassified information, defense industrial base cyber reporting, and network… Continue Reading