by Paul Rosenzweig | Dec 8, 2015 | Cybersecurity
Satoshi Nakamoto exposed? As most readers know, Bitcoin is a crypto currency that was first invented by a pseudononymous mathematician who went by the name of Satoshi Nakamoto. For years, many has sought his true identity. Now, Wired magazine has…
by Paul Rosenzweig | Dec 6, 2015 | Cybersecurity
Form should follow function. That’s a cardinal rule of architecture and also a cardinal rule of corporate organization. Anyone who saw the video earlier this year where hackers successfully took remote control of a Jeep Cherokee knows that, in the…
by Paul Rosenzweig | Oct 26, 2015 | Cybersecurity
Earlier today, the Senate passed the Cybersecurity Information Sharing Act (CISA) by a vote of 74-21. Early reports are that most of the more significant privacy-related amendments were rejected, as was the proposal to eliminate DHS’s status as the…
by Paul Rosenzweig | Sep 3, 2015 | Cybersecurity, Homeland Security, National Security
A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…
by Paul Rosenzweig | Aug 25, 2015 | Cybersecurity
As Wells reported Monday, the Third Circuit has issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp. Readers may recall the background of the case. Wyndham was hacked by a Russian criminal gang who stole a host of personally…