Search for: "Benjamin Wittes, Paul Rosenzweig"
Results 281 - 290
of 290
Sorted by Relevance
|
Sort by Date
24 May 2016, 2:11 pm
It is the “beginning of the end” for the Islamic State in Anbar province, according to the Pentagon, which began pounding Fallujah as part of coordinated ground and air strikes with the Iraqi army yesterday. [read post]
13 Sep 2014, 6:55 am
Paul Rosenzweig participated in a podcast for the Security Ledger focusing on the vulnerability of the Internet of Things. [read post]
14 Mar 2015, 6:55 am
Paul Rosenzweig brought us the news and wondered if, unlike last year’s version, this bill might ultimately succeed, despite concerns over the need for more privacy protections. [read post]
29 Apr 2016, 2:09 pm
” Over in Israel, Prime Minister Benjamin Netanyahu declined France’s initiative to restart peace talks between Israelis and Palestinians. [read post]
27 Feb 2015, 12:11 pm
The Obama administration will send national security adviser Susan Rice to address the annual AIPAC conference next week, despite her recent sharp comments over Israeli Prime Minister Benjamin Netanyahu’s planned address to the U.S. [read post]
16 Feb 2018, 7:55 pm
” Matt Tait and Benjamin Wittes sat down with David Kris and Paul Rosenzweig, earlier this evening, to discuss the indictment on the Lawfare Podcast: In this post, we offer an analysis of the document itself and what inferences are reasonable to draw from it. [read post]
26 Apr 2016, 12:22 pm
In the fight against the Islamic State, it appears that the United States and Iran are impeding one another. [read post]
24 Oct 2013, 10:26 am
The House Permanent Select Committee on Intelligence was to have had a hearing today on proposed reforms to the NSA surveillance programs. [read post]
1 Oct 2018, 11:01 am
-N.Y.); and Lawfare contributors Carrie Cordero, Mary McCord and Paul Rosenzweig. [read post]
5 Apr 2021, 12:14 pm
Paul Rosenzweig, founder of Red Branch Consulting PLLC and former Deputy Assistant Secretary for Policy in the Department of Homeland Security, will give a live presentation on how enterprises can manage, mitigate and monitor their cyber risks by mapping threats and adversary tactics, techniques and procedures to known vulnerabilities. [read post]