experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Cyber Conflict Bibliography
The purpose of this bibliography, originally prepared for the Future of Cyber Warfare symposium held at George Washington University Law School in April 2012, is to provide scholarly and other resources pr The purpose of this bibliography, originally…

Cyber Vacancies—Apply Now!
We know about how difficult it has been to fill the top job at DHS. It seems that the same is true of some of the career posts—especially the ones that deal with cybersecurity. According to a recent GAO report, the Office of Cybersecurity and…

Two Interesting Cyber Developments
I’ve been quiet of late — mostly because our Lawfare readership is so self-evidently (and, I might add, appropriately) engaged in questions of greater immediacy relating to the coming debate over Syrian intervention. I would be remiss, however, if I…

NIST Cybersecurity Framework
The National Institute of Standards and Technology has released a discussion draft of the proposed cybersecurity framework called for by President Obama’s Executive Order. Here is a draft: NIST Discussion Draft of Preliminary Cybersecurity…

Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World (The Changing Face of War)
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments. Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a...

Incentives for Cybersecurity
Consistent with the earlier cybersecurity Executive Order, the Administration has been working on ways of incetivizing the private sector to adopt the Cybersecurity Framework under development by NIST. Earlier today, the White House announced the…
ABA Cybersecurity Handbook
[L]aw firms, government law departments, and other similarly situated organizations have become prime targets. Lawyers have limited resources to dedicate to computer security, may not have a sophisticated appreciation of the associated technology…

Cybersecurity Legislation — Something Completely Different
[T]he draft bill consists of four titles:NIST-facilitated, industry-driven process for developing a set of voluntary cybersecurity standards for critical infrastructure. These standards will not duplicate or conflict with existing cyber requirements…

Offline — The Chinese Peril
Those who follow my blog posts devoutly (both of you :-)) will be sad to learn that I will be off-line from now until the July 4th holiday. Of course, as with everything I write about, the underlying reason for being off-line has a cybersecurity…

Cyber Threats and Cyber Realities
I am participating today and tomorrow at a seminar at Roger Williams University Law School, entitled Cyber Threats and Cyber Realities. It is being hosted by our Lawfare guest contributor Peter Marguiles.On today’s first panel, I was particularly…