experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

President Obama’s National Cybersecurity Plan
In connection with today’s budget roll-out, President Obama has announced a National Cybersecurity Plan. Highlights of his national action plan include the following: In connection with today’s budget roll-out, President Obama has announced a…

A Bad News Roundup — We Can’t Do Cybersecurity. Period.
Pentagon Delays Cybersecurity Requirements. “The Pentagon has delayed for almost two years a requirement that as many as 10,000 companies show that they have systems to protect sensitive but unclassified information from cyber-attacks before signing…

Are Nuclear Power Plants At Cyber Risk?
Late last week, the Washington Post had an article asking the question whether nuclear power plants are at risk of cyber attack. The article was keyed to a much lengthier, detailed report from the Nuclear Threat Initiative (a non-profit associated…

The Cybersecurity Act of 2015
We have white smoke. Finally, after 8 years of discussion Congress has passed a cybersecurity information sharing bill. The Cybersecurity Act of 2015 is Division N of the omnibus spending bill that will soon be enacted by Congress. Title I of that…

Bitcoin Exposed; DNS Hacked; EU Cyber Law Passed
Satoshi Nakamoto exposed? As most readers know, Bitcoin is a crypto currency that was first invented by a pseudononymous mathematician who went by the name of Satoshi Nakamoto. For years, many has sought his true identity. Now, Wired magazine has…

Converging Cyber and the Physical
Form should follow function. That’s a cardinal rule of architecture and also a cardinal rule of corporate organization. Anyone who saw the video earlier this year where hackers successfully took remote control of a Jeep Cherokee knows that, in the…

Cybersecurity Passes
Earlier today, the Senate passed the Cybersecurity Information Sharing Act (CISA) by a vote of 74-21. Early reports are that most of the more significant privacy-related amendments were rejected, as was the proposal to eliminate DHS’s status as the…

Encryption and Law Enforcement Special Access: The U.S. Should Err on the Side of Stronger Encryption
A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…

The FTC Takes Charge — FTC v. Wyndham
As Wells reported Monday, the Third Circuit has issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp. Readers may recall the background of the case. Wyndham was hacked by a Russian criminal gang who stole a host of personally…

Users Weigh in on What Database the PLA Should Hack Next
The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…