experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Groundhog Day in the Senate
One of my favorite movies has always been Bill Murray’s Groundhog Day. Besides the great acting from Murray (and co-star Andie MacDowell) it’s a wonderful exposition of the definition of insanity — doing the same thing over and over again expecting…

Bits and Bytes
Neustar looks to lose its contract. “Federal Communications Commission staff has recommended that a $450 million contract Sterling-based company Neustar has held exclusively for 18 years be awarded to rival Ericsson.” Readers will recall that the…

The New White House Information Sharing Executive Order
Last Friday, as part of the Cybersecurity summit at Stanford, President Obama announced a new information sharing initiative, and issued an Executive Order that was tied to the initiative. The EO will, in the end, do some modest good, but not nearly…

The Internet of Things and Security — Process Not Standards
Earlier this year, Herb posted a nice summary of the FTC’s report on the security of the internet of things. Today, Senator Ed Markey joins the conversation with a staff report on the insecurity of automobiles. As the Post summarizes it, the Markey…

Reforming DHS: Missed Opportunity Calls for Congress to Intervene
Late last year, President Barack Obama announced that the Department of Homeland Security (DHS) would provide work authorization and protection from deportation to as many as 5 million unlawful immigrants. One of the side effects of that announcement…

The Administration’s Cyber Proposals — Information Sharing
As part of the run-up to the State of the Union address next week, the Administration has been releasing publicly some of its policy proposals. One of the most notable suite of proposals involved new legislation relating to cybersecurity. The…
The CENTCOM Twitter Hack
By now, most readers of this blog are well aware that, for a brief period of time yesterday, ISIS cyber warriors (going under the hashtag #CyberCaliphate) took control of the CENTCOM Twitter and You-Tube accounts. Twitter and You-Tube are, of course,…

Cyber Supply Chain Security
There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of software liability, which would, drive safer code. There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of…

Pass Phrases Protected; Fingerprints Not — Curiouser and Curiouser
The House of Representatives has passed the Cybersecurity Intelligence Sharing and Protection Act, by a vote of 288-127. This happened after several amendments were adopted (most notably one offered by Rep. The House of Representatives has passed the…

Continuing Federal Cyber Breaches Warn Against Cybersecurity Regulation
Recent high-profile private-sector hacks have once again put a spotlight on the issue of cybersecurity.[1] This is a serious problem that requires legislation to improve the United States’ cybersecurity posture, but the U.S. should not reflexively…