In a recent debate between NSA director Mike Rogers and Yahoo Chief Information Security Officer Alex Stamos, the topic of law-enforcement restricted access to encrypted communications once again came up.
I have written an essay for Hoover’s The Briefingseries entitled The Tricky Issue of Severing US “Control” Over ICANN. Tomorrow the Senate Commerce, Science, and Transportation committee will have an important hearing on this subject.
This short book offers a window into research and development taking place at MIT, Stanford, and other U.S. universities that in the next decade or two might revolutionize the production and consumption of energy. New ideas are emerging in five main areas: shale gas, solar photovoltaics, electricity storage, electric cars, and LED lighting.
On the eve of the White House Summit on Cybersecurity and Consumer Protection, Stanford hosted two events related to privacy technologies and future research and education. The discussions addressed current and future challenges.
As many know, the White House held a summit on cybersecurity and consumer protection at Stanford University today. In addition to President Obama, a number of CEOs also spoke on privacy and security issues in the context of consumer protection, and of course the backdrop for much of the summit was the Snowden revelations and the public and industry reaction to them.
On Friday, February 13, President Obama will travel to Silicon Valley to engage with business and academic leaders in the tech community as part of a push to ensure a robust national cybersecurity posture that emphasizes strong defenses and resilient networks.
According to the Washington Post, the Obama administration is establishing a new agency to fuse intelligence from around the government when a cyber crisis occurs. Lisa Monaco, assistant to the president for homeland security and counterterrorism, is quoted as saying that “policymakers and operators will benefit from having a rapid source of intelligence [about incoming cyberattacks],” and that policymakers will have an “integrated, all-tools approach to the cyberthreat.”