experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

From Awareness to Action – A Cybersecurity Agenda for the 45th President
Eight years ago, the Center for Strategic and International Studies published an influential report that was a blueprint for early cybersecurity policy development in the Obama Administration. Eight years ago, the Center for Strategic and…

A Cybersecurity Bleg
To bleg: An entry on a blog requesting information or contributions. I have such a request. I recently came across this article: Trent Moore, DARPA DEVELOPING NEW COMPUTER CODE THAT IS EFFECTIVELY HACK-PROOF. Published by The Lawfare Institute in…

China’s National Cybersecurity Strategy
Earlier today, the Chinese government released its National Cybersecurity Strategy. A government news agency report on the release is here. According to the report: “China’s top Internet regulator released a cyberspace security strategy on Tuesday,…

Why Cybersecurity Is So Hard—Absurd Division
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the “theater of the absurd” division of reasons…

No, DHS is Not Going to “Take Over” the Electoral System
There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. From the…

On the Utility of Transparency through Disclosure of Software Bugs
Last week, co-blogger Nick Weaver posted a short summary of why he holds the view that Apple products are safe, but that Android products systematically are not. His recommendation was to throw your Android phone in the garbage and he asked, somewhat…

The Wages of Information Sharing Sin
What is worse than the Federal government having actionable confidential information that it doesn’t share with state and local governments, even though that information could assist them? How about sharing that information only to turn around and…

CYBERCOM Grows Up, Chinese IP Theft, and Apple’s Bug Bounty
A few days at the beach see a number of interesting (and as yet unremarked in Lawfare) cyber items: A few days at the beach see a number of interesting (and as yet unremarked in Lawfare) cyber items: he Obama administration is preparing to elevate…

Rethinking the Doctrine of Homeland Security – Reflections on Orlando
Almost everything we think we know about homeland security is outdated. Almost everything we think we know about homeland security is outdated. If the lessons of Paris (twice), Brussels, San Bernardino, Orlando, Istanbul (just yesterday), Sony, the…

Apparently The Word “Foolish” Is Spelled “SWIFT”
It is difficult to shock people these days. Especially in the cybersecurity realm we have seen so many different foolish ways of being vulnerable that one becomes inured to it. As Kevin Mittnick is reported to have said once: “There is no patch for…