Blogs

  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    by Ben Rothke on September 10, 2013

    It has been about 8 years since my friend Richard Bejtlich’s (note, that was a full disclosure ‘my friend’) last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this highly informative and actionable…

  • Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger

    by Ben Rothke on September 7, 2013

    In Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, Professor Harvey Molotch argues that the government is worrying about the wrong things, and wasting huge amounts of money in the process. With a focus on post 9-11 events, he suggests that while significantly more security measures are in place, most people do not feel safer, and it is even arguable…

  • Security Blogger Q&A - Security Spread

    by Ally Lorentson Dunn on September 5, 2013

    Jay, Security Spread: Security Awareness http://securityspread.com Describe your blog in one sentence: Creating security awareness with the main focus on Mac. How did you become interested in information security? No one could provide me with answers when it came to security as it was/is a taboo for Mac users. So, I set out to learn and find my own answers. Why did you decide to blog about…

  • The Perils of Audits

    by Gib Sorebo on August 31, 2013

    Among critical infrastructure asset owners, a common device for ensuring that their cybersecurity risk posture is appropriate is an audit. We'll leave aside whether the motivation is compliance or simply a desire to be as secure as possible against attacks. In essence, both motivations often lead to the disaster that is the audit whether it is driven by "best practices" or a particular compliance…

  • Practical Anonymity: Hiding in Plain Sight Online

    by Ben Rothke on August 29, 2013

    With that news that the NSA is monitoring much of the traffic on the Internet, many people are looking to go below the radar. In Practical Anonymity: Hiding in Plain Sight Online, author Peter Loshin shows how to make anonymous use of the Internet. Much of this brief book (130 pages) is on the use of tools such as Tor and Tails. Looks to be interesting. Full review to follow. ISBN 978-0124104044

  • Why Have a Privacy Policy

    by Stephen Wu on August 28, 2013

    Privacy has been a hot legal issue for years, and the temperature is moving even higher. Governmental enforcement actions and class action suits have become ever more common. One common trigger is a data privacy or security breach. Surprisingly, in 2013, another common trigger is the lack of a privacy policy. Yes, there are some companies that create online services or Internet applications…

  • Security Blogger Q&A - Elliott Frantz

    by Ally Lorentson Dunn on August 26, 2013

    Elliott Frantz, Virtue Security: http://www.virtuesecurity.com/blog/ Describe your blog in one sentence: Application security for ethical hacking professionals. Complete this sentence: “The RSA Conference is a world in its own. ” How did you become interested in information security? I started as teenager when I was just beginning high school. I was first interested in learning to program as a…

  • Hacking Exposed Mobile: Security Secrets & Solutions

    by Ben Rothke on August 26, 2013

    Little did anyone know that when the first Hacking Exposed books came out over 15 years ago, that it would launch a set of sequels on topics from Windows, Linux, web development, to virtualization and cloud computing, and much more. It was a series that launched a generation of script kiddies, in addition to security experts. In 2013, the newest edition is Hacking Exposed Mobile Security Secrets …

  • The Evolution of What We Value and How Much

    by Gib Sorebo on August 19, 2013

    In the current controversies involving what our intelligence community is collecting about its citizens, the issue has frequently been framed as a balance of protecting the personal safety of people versus protecting one’s privacy. While delving deeper may reveal a false dichotomy, we nonetheless must acknowledge that such tradeoffs do exist. At the very least, we’ve come to expect and accept…

  • Secret History: The Story of Cryptology

    by Ben Rothke on August 15, 2013

    In Secret History: The Story of Cryptology, author Craig Bauer notes that most available cryptology books primarily focus on either mathematics or history. Breaking this mold, the book gives a thorough yet accessible treatment of both the mathematics and history of cryptology. This looks to be a really interesting read. Full review to follow. Chapman Hall/CRC 1466561866 978-1466561861 Rothke

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 15 Sep 2014 00:03:21 -0400.
© 2014 EMC Corporation. All rights reserved.