experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Strategic Planning for a More Secure Network
As we move toward a presidential election, the question arises: what should the next President (whoever he or she may be) do about cybersecurity? It is a sufficiently salient question that President Obama has chartered a commission, whose basic…

Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702 Program
Section 702 of the Foreign Intelligence Surveillance Act (FISA) will, in its current form, come up for reauthorization in 2017. Broadly speaking, the Section 702 program targets non-U.S. persons reasonably believed to be located outside the United…

President Obama Names Members of Commission on Enhancing National Cybersecurity
The President had previously named Tom Donilon and Sam Palmisano as Co-chairs. Today, he announced the members of the panel, including our own Herb Lin. Congrats Herb. The Commission is due to file a report by December and will have its first meeting…

How Concerned Should We Be about IoT Vulnerability?
In 2006, when the Office of the Director of National Intelligence provided its first “Annual Threat Asssessment” top billing went to the “Global Jihadist Threat.” Rounding out the top three concerns, Director Negroponte mentioned the then-ongoing…

President Obama’s National Cybersecurity Plan
In connection with today’s budget roll-out, President Obama has announced a National Cybersecurity Plan. Highlights of his national action plan include the following: In connection with today’s budget roll-out, President Obama has announced a…

A Bad News Roundup — We Can’t Do Cybersecurity. Period.
Pentagon Delays Cybersecurity Requirements. “The Pentagon has delayed for almost two years a requirement that as many as 10,000 companies show that they have systems to protect sensitive but unclassified information from cyber-attacks before signing…

Are Nuclear Power Plants At Cyber Risk?
Late last week, the Washington Post had an article asking the question whether nuclear power plants are at risk of cyber attack. The article was keyed to a much lengthier, detailed report from the Nuclear Threat Initiative (a non-profit associated…

The Cybersecurity Act of 2015
We have white smoke. Finally, after 8 years of discussion Congress has passed a cybersecurity information sharing bill. The Cybersecurity Act of 2015 is Division N of the omnibus spending bill that will soon be enacted by Congress. Title I of that…

Bitcoin Exposed; DNS Hacked; EU Cyber Law Passed
Satoshi Nakamoto exposed? As most readers know, Bitcoin is a crypto currency that was first invented by a pseudononymous mathematician who went by the name of Satoshi Nakamoto. For years, many has sought his true identity. Now, Wired magazine has…

Converging Cyber and the Physical
Form should follow function. That’s a cardinal rule of architecture and also a cardinal rule of corporate organization. Anyone who saw the video earlier this year where hackers successfully took remote control of a Jeep Cherokee knows that, in the…