Author: Admin_WCS
Page 2/26
Actual Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
A 21st Century Cyber-Physical Systems Education – Free book from National Academies Press
Tort Liability for Buggy Software

AppleVsFBI, cyber deterrence, Cybercrime, Cybersecurity, law enforcement, Privacy
FBI Director’s Speech at the Symantec Government Symposium 8/30/2016 full text and audio

AppleVsFBI, cyber deterrence, Cybercrime, Cybersecurity, law enforcement, Privacy
FBI Director’s Speech at the Symantec Government Symposium 8/30/2016 full text and audio
Newly discovered spyware breaks ground, raises policy questions, says Politico
“Military Cyber Operations” Congressional Hearing to be Held on 6/22/16

Cyber Espionage, Cyber Exploitation
U.S. Charges Chinese Man With Economic Espionage For Stealing Source Code With Intent To Benefit The Chinese Government

Cyber Espionage, Cyber Exploitation