Menu

Blogs: Security Reading Room

  • Breakthroughs in Decision Science and Risk Analysis

    by Ben Rothke on May 3, 2016

    Decision and risk analysis is the discipline comprising the philosophy, theory, methodology, and professional practice necessary to address important decisions in a formal manner. Decision analysis includes many procedures, methods, and tools for identifying, clearly representing, and formally assessing important aspects of a decision, for prescribing a recommended course of action by applying…

  • Hadoop Security: Protecting Your Big Data Platform

    by Ben Rothke on May 2, 2016

    As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices. When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop. …

  • Hacking for Dummies: Fifth Edition

    by Ben Rothke on April 26, 2016

    I’ve enjoyed Kevin Beaver’s Hacking for Dummies series for over a decade. The first edition came out in 2004 and I reviewed the four th edition here. Now in its fif th edition, the books 22 chapters progress from the basics of security to the hardening of an operating system, to the hacking of Web applications and more. The new edition covers Windows 10 and Linux, and includes a number of more…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • Dark Territory: The Secret History of Cyber War

    by Ben Rothke on April 13, 2016

    With a catchy title of Dark Territory: The Secret History of Cyber War, (Simon & Schuster ISBN 9781476763255), this new book by Pulitzer Prize winning author Fred Kaplan looked to be a winner. Not that it’s not a good book; but for anyone who’s been involved with information security and cyberwarfare, most of the stories are already known and have long been covered. The book gets it title based on…

  • They Know Everything About You: How Data-Collecting Corporations and Snooping Government Agencies Are Destroying Democracy

    by Ben Rothke on April 7, 2016

    When Woody Guthrie first wrote his classic “This Land Is Your Land”, it was an angry protest song. Joe Klein writes in Woody Guthrie: A Life that Guthrie began writing the song out of anger and frustration. To a degree author Robert Scheer has written a book that expresses his frustration and anger at the abuse of power when it comes to misuse of personal digital privacy and the ensuing…

  • Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

    by Ben Rothke on April 1, 2016

    The notion of information assurance is not necessarily synonymous with information security. In Information Assurance Handbook: Effective Computer Security and Risk Management Strategies, (McGraw-Hill Education ISBN-13: 978-0071821650), authors Corey Schou and Steven Hernandez examine the subtle differences. Information assurance is about assuring information and managing risks related to all…

  • The Car Hacker's Handbook: A Guide for the Penetration Tester

    by Ben Rothke on March 26, 2016

    The history of technology is replete with instances of security researchers finding a flaw in a product. The vendors then discount the issue and mock the findings; saying it’s only a theoretical vulnerability. They may even resort to suing the researchers. When the vulnerability becomes widespread, these vendors then run to patch their insecure product. We are in that situation now with…

  • The Mathematics of Various Entertaining Subjects: Research in Recreational Math

    by Ben Rothke on March 10, 2016

    Recreational mathematics as defined by Wikipedia is a term for mathematics carried out for recreation (entertainment) rather than as a strictly research and application-based professional activity, although it is not necessarily limited to being an endeavor for amateurs. It often involves mathematical puzzles and games. Perhaps the greatest proponent of recreational mathematics was Martin…

  • Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want

    by Ben Rothke on February 28, 2016

    Information security is a hot career area. There supply of qualified information security professionals is out of proportion to the growing demand. A recent article in Forbes states (erroneously in my opinion) there will be 1 million cybersecurity job openings in 2016. Whatever the number truly is, nearly every security department in corporate American is struggling to fully their thein security…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 05 May 2016 00:48:16 -0400.
© 2016 EMC Corporation. All rights reserved.