Cover photo
Paul Roberts
Works at The Security Ledger
Attended Vassar College
Lives in Belmont, Massaschusetts
625 followers|173,886 views


Paul Roberts

Shared publicly  - 
In-brief: The Washington Post said on Monday that an investigation of a cyber attack against Burlington Electric in Vermont was not targeted and points away from Russian involvement.
Add a comment...

Paul Roberts

Shared publicly  - 
In-brief: Barnes & Noble said its Nook tablets have not been used to steal data and that it is taking steps to stop using software by the Chinese firm Shanghai Adups Technology Co. Ltd. (ADUPS)…
Add a comment...

Paul Roberts

Shared publicly  - 
In-brief: The author argues that the devaluation of traditionally “soft” skills like empathy, communication and collaboration in the information security space may be hampering the abil…
Add a comment...

Paul Roberts

Shared publicly  - 
A proposed on-road route along Concord Ave. that is being rated highly as a choice for Belmont’s Community Path would pose serious safety concerns to Path users and runs counter to the commun…
Add a comment...

Paul Roberts

Shared publicly  - 
In-brief: Attacks that took 900,000 broadband routers offline in Germany have hit other countries as well, as security experts warn that the number of devices vulnerable to attack could number in t…
Add a comment...

Paul Roberts

Shared publicly  - 
In-brief: errant reports about a Russian government hack of a Vermont utility are the first byproduct of a flawed report on Russian hacking of U.S. interests. They won’t be the last.
Add a comment...

Paul Roberts

Shared publicly  - 
In-brief: NETGEAR has issued an emergency software patch for a serious vulnerability in its home routers, even as the company expands the list of affected hardware, adding five more models to the l…
Add a comment...

Paul Roberts

Shared publicly  - 
In-brief: More than 100,000 homes in the UK had their Internet access interrupted by an attack on broadband routers. The incident is believed to be part of a larger attack that affected some 900,00…
Add a comment...

Paul Roberts

Shared publicly  - 
In-brief: In our latest Security Ledger podcast, we talk with Luma founder and CEO Paul Judge, a serial entrepreneur (Ciphertrust, Purewire, Pindrop) whose latest venture seeks to bring enterprise-…
Add a comment...

Paul Roberts

Shared publicly  - 
I have a thing for makerspaces and hackerspaces, if you haven’t already noticed from my previous posts. To me, they are the epitome of what I love about the Internet of Things (IoT). It is somethin…
Add a comment...
security blogger | runner | dad
I'm a 40-something living in the suburbs of Boston with my wife, three daughters and a mortgage. I'm Editor in Chief of The Security Ledger, a news blog that covers computer security and privacy, hacking and malware. In past lives, I've worked as a technology analyst and a reporter for a variety of publications including, The 451 Group, Ziff Davis's eWeek, InfoWorld and the IDG News Service. My work has appeared in the Boston Globe,, Forbes Small Business and elsewhere. I was, yes, a guest on The Oprah Show...but it's a long story.
  • Vassar College
  • University of Utah
Basic Information
Writer, Editor
  • The Security Ledger
    Editor in Chief, 2012 - present
  • Kaspersky Lab
    Editor,, 2010 - 2012
  • 451 Group
    Senior Analyst, Enterprise Security, 2007 - 2010
  • Infoworld
    Editor, 2006 - 2007
  • Ziff Davis
    Senior Writer, 2005 - 2006
  • IDG
    U.S. Correspondent, IDG News Service, 2002 - 2005
  • Cisco Systems, Inc.
    Technical Writer, 2000 - 2002
  • SteelPoint Technologies
    Marketing and Communications Manager, 1996 - 2000
  • Logica PLC
    Technical Writer, 1994 - 1996
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Belmont, Massaschusetts
Paul Roberts's +1's are the things they like, agree with, or want to recommend.
Cyber insurance: Only fools rush in | ITworld

Experts say that the cyber insurance market is still young and, when it comes to insuring against cyber attacks, do your homework

Liquid computing: The next wave of the mobile experience

The traditional enterprise workflow is ripe for huge change as the focus moves away from working in a single context on a single device to t

Is It Time For Customs To Inspect Software? | Veracode Blog

The Zombie Zero malware proves that sophisticated attackers are targeting the supply chain. Is it time to think about inspecting imported ha

Truth, Fiction and a 20 Year Old Vulnerability | Veracode Blog

What were you doing in 1996? You remember '96, right? Jerry McGuire, Independence Day and Fargo were in the theaters. Everybody was dancing

Heartbleed Still Causing Heartburn on Industrial Systems | Veracode Blog

An advisory from DHS's ICS CERT makes clear that ICS vendors are making progress toward fixing Heartbleed, but that customers face a long sl

AppSec Makes A Cameo In Obamacare Drama | Veracode Blog

Warnings about death panels have proven to be overheated. Now the law's critics in Congress are demanding code audits for Gu

Time to Crowdfund Open Source Security? | Application Security News, Res...

Will crowd funding bug bounties for OpenSSL solve its security problems? Probably not. crowfund-openssl-bug-bounty. For years, security expe

Heartbleed And The Curse Of Third-Party Code | Application Security News...

The recently disclosed vulnerability in OpenSSL pokes a number of enterprise pain points. Chief among them: the proliferation of vulnerable,

CERF: Classified NSA Work Mucked Up Security For Early TCP/IP | Applicat...

Internet pioneer Vint Cerf says that he had access to cutting edge cryptographic technology in the mid 1970s that could have made TCP/IP mor

Hell is Other Contexts: How Wearables Will Transform Application Develop...

Wearable technology is in its infancy. But don't be fooled: the advent of wearables will fundamentally change the job of the application dev

Five Product Security Questions Nobody At CES Wants You To Ask

The annual Consumer Electronics Show kicks off in Las Vegas this week. With rivers of ink spilled on cool, new “smart” products, here are fi

AllSeen Alliance

Enabling the Internet of Everything

Google Unveils Toolkit To Stop Online Oppression

Google said on Monday that a suite of new services will help political activists, small businesses and non-profits defend themselves against

Breaking Bad(ware): Micro-targeting hits the spam world

A new spam run targeting fans of the cult show Breaking Bad proves that for spammers (and other business folk) we are the sum of the niche g

7 ways to beat fingerprint biometrics

Apple's embrace of finger scanning technology in the iPhone could be a breakthrough moment for biometrics. But finger scanners are no panace

DIY security: Cool tools you can build yourself

DIY electronics is entering a golden age with the help of powerful, cheap, programmable devices like the Arduino micro controller and Raspbe

Secure Email Is Dead

Recent revelations about wide ranging and warrantless government surveillance don’t mean that e-mail is dead – just that you can’t ever trus

IPMI: The most dangerous protocol you've never heard of

Another week, another terrifying presentation about security holes in IPMI – a widely used technology for remote management of servers. But

Next up: The Jamming wars

Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government-

Black Hat 2013: Rise of the (Smart) Machines

Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences