experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.
Campaigns ramp up cybersecurity
From The Washington Examiner: Among the tools and tactics available to campaigns are two-factor authentication, restricting access to important files so they are not on a shared server, and segmenting networks, said Paul Rosenzweig, a senior fellow…

Mueller’s Hidden Nuggets
From Skullduggery: Shane Harris – Senior National Security writer at the Washington Post, as well as Paul Rosenzweig – Senior Fellow, National Security & Cybersecurity at R Street join co-hosts Michael Isikoff, Daniel Klaidman and Yahoo’s WH…

Cybersecurity and the Mueller Report
It isn’t as sexy as the overall question of Russian information operations or the president’s obstructive criminal behavior, but as someone focused on cybersecurity more generally, I thought it would be amusing to tease out a few of the issues in the…

WikiLeaks’ Julian Assange faces U.S. computer-hacking charge after arrest in London
From The Los Angeles Times: Paul Rosenzweig, a cybercrime expert and former Homeland Security official, said prosecutors have charged Assange with violating a 1984 cybersecurity law called the Computer Fraud and Abuse Act. “Journalists are not at…

Cybersecurity News Briefs
SHOULDN’T SOME ONE INVESTIGATE cybersecurity events to determine what happened, and how similar incidents might be prevented in the future? And with no effort to cast blame or judge whether the savings would justify the cost? There is an agency that…

Wyden, Cotton Introduce Bipartisan Bill to Protect Personal Devices and Accounts of Senators and Staff from Cyber Threats
March 27, 2019 Washington, D.C. – U.S. Sens. and members of the Senate Intelligence Committee Ron Wyden, D-Ore., and Tom Cotton, R-Ark., today introduced a bipartisan bill to protect the personal electronic devices and accounts of senators and their…

Next up at RSA: election security, DHS and NSA
Presented by With help from Eric Geller and Martin Matishak Editor’s Note: This edition of Morning Cybersecurity is published weekdays at 10 a.m. POLITICO Pro Cybersecurity subscribers hold exclusive early access to the newsletter each morning at 6…

Rearranging the Cyber Deck Chairs
It is a commonplace in government to substitute reorganization for rethinking at a more fundamental level. Tuesday’s Washington Post reports another instance of the phenomenon. It is a commonplace in government to substitute reorganization for…

Kaspersky Helps the NSA
Most Lawfare readers will be familiar with Kaspersky Labs, the Russian cybersecurity firm. Many American cyberspecurity experts (including Rick Ledgett, Nicholas Weaver, and me) have been skeptical about the firm, suspecting that its connections to…

Why press fears on Assange charges are premature
Reporters don’t get to break the law to create or investigate a story. “If you speed on the way to a story, you’re still speeding,” said Paul Rosenzweig, who teaches cybersecurity law at George Washington University School of Law. “You don’t get a…