recommended reading

author archives

Jessica Herrera-Flanigan

Jessica Herrera-Flanigan

Jessica R. Herrera-Flanigan is a partner at the Monument Policy Group, where she focuses on the issues affecting our nation’s security, technology, commerce, and entertainment markets. Previously, she served as the Staff Director and General Counsel of the House Committee on Homeland Security. She also has served as Senior Counsel at the Computer Crime & Intellectual Property Section, Criminal Division, U.S. Department of Justice, where she led the Section’s cybercrime investigation team. She was a Member of the CSIS Commission on Cyber Security and is a Member of the ABA Standing Committee on Law & National Security. She currently serves as the Fellow for Cybersecurity at the Center for National Policy.

Results 81-90 of 90

Cybersecurity Ecosystem: The Future?

March 24, 2011 The Department of Homeland Security on Wednesday rolled out its much-anticipated white paper on the ecosystem of cybersecurity. The document, according to DHS: explores technical options for creating a safer, more secure and resilient network of networks. Specifically, the paper looks at how prevention and defense can be enhanced through...

RSA Hack: What Does It Mean?

March 18, 2011 Yesterday, RSA Security, a division of EMC Corporation, was attacked by hackers who stole sensitive information related to the SecurID two-factor authentication products. These "security tokens," whose pass codes change every 30 to 60 seconds, are used by more than 40 million individuals worldwide. RSA's Chairman Art Coviello sent an...

See No Hack, Hear No Hack, Speak No Hack

March 18, 2011 So much of our nation's cybersecurity focus is on controlling information -- who can access it, use it, redistribute it, and talk about it. Experts talk about privacy and access controls, authentication and identity management. But what happens when cybersecurity efforts fail, systems are compromised and information is shared on...

Anonymous: Muckrakers, Gray Hackers, or Criminals?

March 17, 2011 In John Bunyan's Pilgrim's Progress, a man with a muck rake looks downward and rakes endlessly, constantly tackling the muck on the floor without looking up. President Theodore Roosevelt used that image at the turn of the last century to describe a group of investigative journalists intent on exposing waste,...

Cybersecurity and Public-Private Partnerships

March 15, 2011 A coalition of information technology and civil liberties organizations released a joint white paper last week on improving cybersecurity through public-private partnerships. The report is an interesting synthesis of the priorities and concerns of a very broad coalition, and worth reviewing. Larry Clinton, the President and Chief Executive Officer of...

Who Controls The Internet?

March 4, 2011 Who controls the Internet? This is a question that has reemerged in recent weeks as the crisis in the Middle East and North Africa has unfolded. Reports of Egypt's shutdown of network operators left many asking whether other nations, including the U.S., could flip a "kill switch" and bring down...

Mission 4: Safeguarding and Securing Cyberspace

February 15, 2011 In today's Department of Homeland Security budget in brief, cybersecurity plays a significant role as the fourth of the agency's six key missions, first identified in the Quadrennial Homeland Security Review more than a year ago and elaborated on last summer in Bottom-Up Review. According to the budget, the mission...

Cybersecurity: The Director's Perspective

February 11, 2011 Yesterday, the House Permanent Select Committee on Intelligence held a hearing on "World Wide Threats." During the unclassified part of the hearing and in his statement for the record, James Clapper, the Director of National Intelligence, provided an assessment of global threats. While much of his testimony focused on terrorism...

Cybersecurity: A Priority or Passing Fad?

January 27, 2011 The 112th Congress, by all accounts, will be a busy one on the cybersecurity front. Both the House and the Senate have taken actions to suggest that Congress intends to be active legislatively, though likely in very different ways. This week, several Democrats introduced S. 21, "Cyber Security and American...

Security Is About More Than Who Has the Keys

January 24, 2011 Very often in computer security, too much trust is put in access controls -- passwords, identification cards, biometrics, and so on -- and not enough thought is given to limiting the consequences if those controls are defeated and unauthorized access occurs. I was reminded of this when reading Bill Snyder's...