by Paul Rosenzweig | Jan 17, 2016 | Cybersecurity
Late last week, the Washington Post had an article asking the question whether nuclear power plants are at risk of cyber attack. The article was keyed to a much lengthier, detailed report from the Nuclear Threat Initiative (a non-profit associated…
by Paul Rosenzweig | Dec 15, 2015 | Cybersecurity
We have white smoke. Finally, after 8 years of discussion Congress has passed a cybersecurity information sharing bill. The Cybersecurity Act of 2015 is Division N of the omnibus spending bill that will soon be enacted by Congress. Title I of that…
by Paul Rosenzweig | Dec 8, 2015 | Cybersecurity
Satoshi Nakamoto exposed? As most readers know, Bitcoin is a crypto currency that was first invented by a pseudononymous mathematician who went by the name of Satoshi Nakamoto. For years, many has sought his true identity. Now, Wired magazine has…
by Paul Rosenzweig | Dec 6, 2015 | Cybersecurity
Form should follow function. That’s a cardinal rule of architecture and also a cardinal rule of corporate organization. Anyone who saw the video earlier this year where hackers successfully took remote control of a Jeep Cherokee knows that, in the…
by Paul Rosenzweig | Oct 26, 2015 | Cybersecurity
Earlier today, the Senate passed the Cybersecurity Information Sharing Act (CISA) by a vote of 74-21. Early reports are that most of the more significant privacy-related amendments were rejected, as was the proposal to eliminate DHS’s status as the…