Content

Buying Down Risk

May 3, 2022

Buying down risk: Open source software

By Trey Herr, Robert Morgus, Stewart Scott, and Tianjiu Zuo

Open-source software underpins most modern code, and the unique incentives and constraints its developers face pose a tricky set of challenges for the cybersecurity ecosystem.

Cybersecurity Technology & Innovation

Buying Down Risk

May 3, 2022

Buying down risk: Complexity management

By Trey Herr, Robert Morgus, Stewart Scott, and Tianjiu Zuo

The ever-increasing complexity of software programs and services can become a security and operational challenge in and of itself, increasing ecosystem-wide risk.

Cybersecurity Technology & Innovation

Buying Down Risk

May 3, 2022

Buying down risk: Software provenance and composition

By Trey Herr, Robert Morgus, Stewart Scott, and Tianjiu Zuo

SBoM adoption is picking up pace, aiming to provide better insight into and contractual leverage for software components—increased investment, standardization, and coordination can help fully develop SBoM use.

Cybersecurity Technology & Innovation

Buying Down Risk

May 3, 2022

Buying down risk: Cyber poverty line

By Trey Herr, Robert Morgus, Stewart Scott, and Tianjiu Zuo

Many enterprises face systemic challenges to their cybersecurity posture, from resource shortages to suboptimal risk attitudes, all of which weaken an ecosystem only as secure as its weakest links.

Cybersecurity Technology & Innovation

Buying Down Risk

May 3, 2022

Buying down risk: Cyber liability

By Trey Herr, Robert Morgus, Stewart Scott, and Tianjiu Zuo

Despite software's ubiquity and omnipresent vulnerability, conventions around liability for software producers are still informal and rarely enforced.

Cybersecurity Technology & Innovation

Buying Down Risk

May 3, 2022

Buying down risk: Memory safety

By Trey Herr, Robert Morgus, Stewart Scott, and Tianjiu Zuo

Some coding languages, like C and C++, allow for a common, exceptionally dangerous bug called a memory safety error, comprising up to 70 percent of industry vulnerabilities.

Cybersecurity Technology & Innovation

Buying Down Risk

May 3, 2022

Buying down risk in the cyber ecosystem: Arguments for the national cybersecurity strategy

By Trey Herr, Robert Morgus, Stewart Scott, and Tianjiu Zuo

The private sector has enormous influence over the cybersecurity ecosystem. Security investments stemming from enterprise and prioritizing a more resilient environment over reacting to emerging incidents can have massive impact at scale.

Cybersecurity Technology & Innovation

UkraineAlert

May 2, 2022

Lavrov’s anti-Semitic outburst exposes absurdity of Russia’s “Nazi Ukraine” claims

By Peter Dickinson

Russian Foreign Minister Sergei Lavrov has sparked a diplomatic scandal with an anti-Semitic outburst that underlines the absurdity of Russia’s relentless “Nazi Ukraine” propaganda claims.

Conflict Democratic Transitions

UkraineAlert

Apr 30, 2022

Ukraine War Diary: “You can never really get used to the air raid sirens”

By Vitaly Sych

Ukrainian media personality Vitaly Sych has kept a war diary recounting his experiences and observations during the past two terrifying and heroic months as Ukrainians have adjusted to Vladimir Putin’s criminal invasion.

Conflict Cybersecurity
Screenshot of footage from a Russian report on a supposed Ukrainian missile downed in Kherson. (SOURCE: Izvestia)

New Atlanticist

Apr 29, 2022

Russian War Report: Questions around metadata on video of Kherson explosion aftermath

By Digital Forensic Research Lab

In occupied Kherson, Russian media reported that Russian forces shot down a Ukrainian missile that they claim was aimed at a TV antenna, but metadata shows the report was shot hours before the explosions.

Disinformation Eastern Europe

Experts

Events