[Podcast] NSA Cybersecurity Services for Defense Contractors
No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel
No Password Required: A Believer That the Key to Internet Safety Is Simple...
Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls
Do Legal Challenges to NSA's PRISM Program Stand a Chance? Yes.
Is Edward Snowden a Whistleblower?
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
Stewart Baker, Former GC of NSA, on Why the Cybersecurity Act Failed & Threat of Tomorrow’s Terrorism
On June 6, 2025, President Trump issued a new executive order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), signaling the construction...more
On January 13, 2025, the U.S. Department of Commerce, Bureau of Industry and Security (BIS) announced an interim final rule (IFR) that modifies and expands export controls on advanced computing integrated circuits (IC) and...more
The Association of American Universities (AAU) and the Council on Governmental Relations (COGR) are among a handful of groups “urging the Biden administration to rescind a policy proposal that would threaten the American...more
Earlier this month, the Biden Administration formally announced that combating corruption is a core United States national security interest. On June 3, 2021, the Biden Administration issued a Memorandum on Establishing the...more
On May 12, 2021, President Biden issued an Executive Order on Improving the Nation’s Cybersecurity following a series of highly publicized cybersecurity incidents during the first four months of his presidency, including the...more
CEP Magazine (October 2020) - On July 16, the Court of Justice of the European Union declared the European Commission’s July 2016 decision on the adequacy of the privacy protection provided by the EU-US Privacy Shield as...more
In Exceptional Software Strategies, Inc., B-416232, the Government Accountability Office (GAO) recently addressed the obscure rules for when a disappointed offeror must request a debriefing. It’s generally well known that,...more
In this episode, Matt Kelly and I take a deep dive into the weeds around the story of Reality Winner, the leaking of the NSA report of Russian hacking of the US Presidential campaign and election. We tie it to internal...more
Whom to suspend during any Foreign Corrupt Practices Act (FCPA) investigation is always a delicate question to answer. Unfortunately there is never an easy answer. As the Volkswagen (VW) emission-testing scandal continues to...more
Today, I wrap up my series on why I think compliance is at the Tipping Point. However as it is a Friday in October, I continue my tribute to the Man in the Shadows, producer Val Lewton, whose films for RKO had some of the...more
I continue my exploration of why I believe that compliance is at the Tipping Point, with today’s entry of data point four, which is last week’s decision by the European Court of Justice (ECJ) in the Schrems case. While most...more
Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more
Following the ECJ’s decision in the “Schrems” case which has invalidated the Safe Harbor framework multinational corporations may now face profound privacy law related compliance issues in a multitude of jurisdictions. In the...more
It’s the second Friday in October and I am continuing my HorrorFest month. I usually call it Monster Movie Fest but this year I am celebrating the films of Val Lewton who really worked more broadly in the horror genre, rather...more
On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more
Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more
Whistleblowing has become a highly charged term, stirring up emotive rhetoric ranging from “ethical hero” to “treasonous traitor” with very little substantive evaluation of the real impact on the corporation and the broader...more
In This Issue: - European Commission Proposes Changes to the US-EU Safe Harbor: In our November Privacy & Cybersecurity Update,1 we reported that the European Commission was undertaking a review of the U.S.-EU...more
One of the things that has long puzzled me is what led to the significant rise in the enforcement of the Foreign Corrupt Practices Act (FCPA) beginning in the 2003-2004 time frame? ...more