experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World (The Changing Face of War)
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments. Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a...

Incentives for Cybersecurity
Consistent with the earlier cybersecurity Executive Order, the Administration has been working on ways of incetivizing the private sector to adopt the Cybersecurity Framework under development by NIST. Earlier today, the White House announced the…
ABA Cybersecurity Handbook
[L]aw firms, government law departments, and other similarly situated organizations have become prime targets. Lawyers have limited resources to dedicate to computer security, may not have a sophisticated appreciation of the associated technology…

Cybersecurity Legislation — Something Completely Different
[T]he draft bill consists of four titles:NIST-facilitated, industry-driven process for developing a set of voluntary cybersecurity standards for critical infrastructure. These standards will not duplicate or conflict with existing cyber requirements…

Offline — The Chinese Peril
Those who follow my blog posts devoutly (both of you :-)) will be sad to learn that I will be off-line from now until the July 4th holiday. Of course, as with everything I write about, the underlying reason for being off-line has a cybersecurity…

Cyber Threats and Cyber Realities
I am participating today and tomorrow at a seminar at Roger Williams University Law School, entitled Cyber Threats and Cyber Realities. It is being hosted by our Lawfare guest contributor Peter Marguiles.On today’s first panel, I was particularly…

Government Cyber Failures Reveal Weaknesses of Regulatory Approach to Cybersecurity
Last year, the Senate twice voted down the Cybersecurity Act of 2012 because of concerns that a regulatory approach might harm U.S. cybersecurity efforts. Despite these concerns, President Obama issued a cybersecurity executive order that uses a…

The Most Important Cybersecurity Case You’ve Never Heard Of
The case is Federal Trade Commission v. Wyndham Worldwide Corporation, a civil suit brought in the District of Arizona by the FTC relating to a cybersecurity breach at Wyndham. To understand why the case matters quite a bit, we need to step back and…

Cybersecurity, CFIUS, and the Propose SoftBank Purchase of Sprint-Nextel
Some readers may have read about the ongoing proposal that SoftBank purchase a controlling interest in Sprint/Nextel. As the Washington Post has reported, the Dish network has made a competing offer to purchase Sprint.Not content with the overt…

Gmail and the CIA
I’ve been in Germany all week (at the George C. Marshall Center which, for those who don’t know, is a joint US-Germany military think tank and an altogether wonderful place to visit) so I missed some of the details of the recent arrest of an alleged…