by Paul Rosenzweig | Jun 21, 2012 | Cybersecurity
As the prospects for real cybersecurity legislation seem to fade, this may be a product whose time has already come and gone. Nevertheless, for those who want a handy chart outlining (in far too brief a fashion) the major similarities and differences…
by Paul Rosenzweig | Jun 18, 2012 | Cybersecurity, Homeland Security
As Raffaela noted earlier today, there appears to be some momentum gaining for the proposed Whitehouse-Kyle compromise legislation on cybersecurity — at least if a letter from Senators Snowe and Warner constitutes momentum. To date, I do not believe…
by Paul Rosenzweig | Jun 1, 2012 | Cybersecurity
By now almost everyone has read David Sanger’s fascinating New York Times story relating the behind-the-scenes story of the development and deployment of the Stuxnet virus as part of a larger classified program known as “Olympic Game.” Others,…
by Paul Rosenzweig | May 23, 2012 | Cybersecurity, Homeland Security
Abstract: The number of cybersecurity attacks on, and breaches within, the United States government has been growing. The U.S. Senate is now gearing up to debate cybersecurity legislation—and will have to vote on whether the federal government should…
by Paul Rosenzweig | May 23, 2012 | Cybersecurity
I’ve lately been thinking of the scope and nature of cyber threats — mostly in writing a still-in-draft response to Jack Goldsmith’s recent defense of cybersecurity regulation. In the interest of furthering the debate, this article on How to Destroy…