experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

NIST Cybersecurity Framework
The National Institute of Standards and Technology has released a discussion draft of the proposed cybersecurity framework called for by President Obama’s Executive Order. Here is a draft: NIST Discussion Draft of Preliminary Cybersecurity…
Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World (The Changing Face of War)
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments. Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a...

Incentives for Cybersecurity
Consistent with the earlier cybersecurity Executive Order, the Administration has been working on ways of incetivizing the private sector to adopt the Cybersecurity Framework under development by NIST. Earlier today, the White House announced the…
ABA Cybersecurity Handbook
[L]aw firms, government law departments, and other similarly situated organizations have become prime targets. Lawyers have limited resources to dedicate to computer security, may not have a sophisticated appreciation of the associated technology…

Cybersecurity Legislation — Something Completely Different
[T]he draft bill consists of four titles:NIST-facilitated, industry-driven process for developing a set of voluntary cybersecurity standards for critical infrastructure. These standards will not duplicate or conflict with existing cyber requirements…

Offline — The Chinese Peril
Those who follow my blog posts devoutly (both of you :-)) will be sad to learn that I will be off-line from now until the July 4th holiday. Of course, as with everything I write about, the underlying reason for being off-line has a cybersecurity…

Cyber Threats and Cyber Realities
I am participating today and tomorrow at a seminar at Roger Williams University Law School, entitled Cyber Threats and Cyber Realities. It is being hosted by our Lawfare guest contributor Peter Marguiles.On today’s first panel, I was particularly…
Government Cyber Failures Reveal Weaknesses of Regulatory Approach to Cybersecurity
Last year, the Senate twice voted down the Cybersecurity Act of 2012 because of concerns that a regulatory approach might harm U.S. cybersecurity efforts. Despite these concerns, President Obama issued a cybersecurity executive order that uses a…

The Most Important Cybersecurity Case You’ve Never Heard Of
The case is Federal Trade Commission v. Wyndham Worldwide Corporation, a civil suit brought in the District of Arizona by the FTC relating to a cybersecurity breach at Wyndham. To understand why the case matters quite a bit, we need to step back and…

Cybersecurity, CFIUS, and the Propose SoftBank Purchase of Sprint-Nextel
Some readers may have read about the ongoing proposal that SoftBank purchase a controlling interest in Sprint/Nextel. As the Washington Post has reported, the Dish network has made a competing offer to purchase Sprint.Not content with the overt…