Filter By:



Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

In the News

Campus Prepares For White House Cybersecurity Summit

mentioning Amy Zegartvia Stanford News
Thursday, February 12, 2015

Among the faculty members participating in the White House Summit on Cybersecurity and Consumer Protection are President John Hennessy, George Triantis, John Mitchell and Jennifer Granick.

In the News

Obama Creates New Cyber Security Agency Ahead Of Stanford Summit

quoting Herbert Linvia KTVU
Wednesday, February 11, 2015

The White House is creating a new federal agency to combat cyber attacks in an effort to improve communication between the government and private companies that might be targeted.

In the News

Obama To Return To Bay Area For Cybersecurity Summit At Stanford

quoting Herbert Linvia NBC
Tuesday, February 10, 2015

President Barack Obama will return to California this week to deliver remarks at a cybersecurity summit at Stanford University.

In the News

Cyber Summit: Michael McFaul on Why The White House Chose Stanford

interview with Michael McFaulvia Center for International Security And Cooperation (CISAC)
Tuesday, February 10, 2015

Michael McFaul, former United States Ambassador to Russia and Director of the Freeman Spogli Institute for International Studies, explains why the White House chose Stanford University for a summit on cybersecurity.

Analysis and Commentary

The New Cyber Threat Intelligence Integration Center

by Herbert Linvia Lawfare
Tuesday, February 10, 2015

According to the Washington Post, the Obama administration is establishing a new agency to fuse intelligence from around the government when a cyber crisis occurs. Lisa Monaco, assistant to the president for homeland security and counterterrorism, is quoted as saying that “policymakers and operators will benefit from having a rapid source of intelligence [about incoming cyberattacks],” and that policymakers will have an “integrated, all-tools approach to the cyberthreat.”

Analysis and Commentary

On The Anthem Hack

by Herbert Linvia Lawfare
Tuesday, February 10, 2015

On February 5, 2015, Anthem—a health insurance company—announced that hackers had been able to access records containing tens of millions of names, birthdays, Social Security numbers, addresses and employment data.

Analysis and Commentary

President Obama To Visit Stanford For White House Cyber Summit

mentioning Amy Zegart, Herbert Linvia Stanford News
Sunday, February 8, 2015

Stanford will welcome President Barack Obama to the campus Friday, Feb. 13, where he will address the White House Summit on Cybersecurity and Consumer Protection.  The president will join top-level government officials, corporate CEOs and Stanford faculty members who will gather to discuss pressing issues at the all-day summit organized by the White House.

Analysis and Commentary

On Cybersecurity For The Internet Of Things

by Herbert Linvia Lawfare
Saturday, January 31, 2015

On Tuesday, January 27, 2015, the Federal Trade Commission released a staff report on cybersecurity and the Internet of Things.

Analysis and Commentary

A Speech by General Hayden

by Benjamin Wittesvia Lawfare
Wednesday, January 28, 2015

Events which took place at a Washington and Lee School of Law symposium on “Cybersurveillance in the Post-Snowden Age” include a speech by General Michael Hayden about NSA and surveillance matters.

Analysis and Commentary

Reactions To NYT Story On North Korean Cyber Penetration

by Jack Goldsmithvia Lawfare
Monday, January 19, 2015

David Sanger and Martin Fackler write in the NYT that the NSA “drilled into the Chinese networks that connect North Korea to the outside world, picked through connections in Malaysia favored by North Korean hackers and penetrated directly into the North with the help of South Korea and other American allies,” and also placed malware in North Korean computer systems “that could track the internal workings of many of the computers and networks used by the North’s hackers.” 


Watch the LiveStream!