Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Search Results for: NSA

The insane resurgence of vinyl records

The Hustle: Vinyl has reclaimed its throne as the most-popular physical music format. But can the industry meet the demand? – Long before the days of Spotify, Apple Music, and YouTube, vinyl records were all the rage. In the 1970s, vinyl sales peaked at 530m units/year and accounted for 66% of all music format revenues.… Continue Reading

NSA, CISA publish guide for securing VPN servers

The Record: “The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published today technical guidance on properly securing VPN servers used by organizations to allow employees remote access to internal networks. The NSA said it put together the nine-page guide [PDF] after “multiple nation-state advanced persistent threat (APT) actors” weaponized… Continue Reading

Paper – Corporate Tax Breaks and Executive Compensation

Corporate Tax Breaks and Executive Compensation, Eric Ohrn, Department of Economics, Grinnell College, February, 2021 – “I analyze the effect of two corporate tax breaks, bonus depreciation and the Domestic Production Activities Deduction (DPAD), on executive compensation in publicly traded US firms. I find both tax breaks significantly increase executive compensation. For every dollar a… Continue Reading

Toto, we are not in Kansas anymore A Critical Reflection on Zoomification

Steininger, Silvia: Toto, we are not in Kansas anymore: A Critical Reflection on Zoomification, VerfBlog, 2020/8/04: “The massive consequences of the Covid-19 pandemic are felt throughout the world, not the least in our daily work as scholars and practitioners. While the effect of the pandemic upon the political, legal, and economic systems have been widely… Continue Reading

NSA – Limiting Location Data Exposure

NSA Cybersecurity Information: “Mobile devices store and share device geolocation data by design. This data is essential to device communications and provides features—such as mapping applications—that users consider indispensable. Mobile devices determine location through any combination of Global Positioning System (GPS) and wireless signals (e.g., cellular, wireless (Wi-Fi®1), or Bluetooth®2 (BT)). Location data can be… Continue Reading

NSA’s guide for choosing a safe text chat and video conferencing service

ZDNet – NSA publishes guidance on choosing a secure teleworking service. Assessed tools include Slack, Zoom, Signal, Skype, more. “The guidance contains a list of security criteria that the NSA hopes companies take into consideration when selecting which telework tool/service they want to deploy in their environments. The NSA document is not only meant for… Continue Reading

Zoom or Not? NSA Offers Agencies Guidance for Choosing Videoconference Tools

NextGov: “Video conferencing platforms Zoom and Microsoft Teams are both FedRAMP-approved, but while Zoom offers end-to-end encryption, Microsoft Teams does not.  These are just two of nine factors the National Security Agency cites in its guide to help federal workers choose commercial telework tools for “safely using collaboration services,” as necessitated by the coronavirus pandemic.… Continue Reading

Python programming language: Now you can take NSA’s free course for beginners

ZDNet – NSA releases Python course after receiving a Freedom of Information Act (FOIA) request for its training materials. “Developers already have numerous options from the likes of Microsoft and Google for learning how to code in the popular Python programming language. But now budding Python developers can read up on the National Security Agency’s… Continue Reading

NSA Takes Step Toward Protecting World’s Computers, Not Just Hacking Them

The New York Times: “The National Security Agency has taken a significant step toward protecting the world’s computer systems, announcing Tuesday that it alerted Microsoft to a vulnerability in its Windows operating system rather than following the agency’s typical approach of keeping quiet and exploiting the flaw to develop cyberweapons. The warning allowed Microsoft to… Continue Reading