Blogs

  • My slides from the PechaKucha (PK) Happy Hour

    by Ben Rothke on March 5, 2010

    The inaugural RSA PechaKucha (PK) Happy Hour was a huge success. My slides from last night’s PK event: Knowledge is power. A great way to become a powerful security professional is by reading. But what books should a busy security professional be reading? are at https://365.rsaconference.com/docs/DOC-2508 Slides for the other presenters are at https://365.rsaconference.com/community/connect/rsa-c…

  • Tales from the Info Security Reading Room

    by Ben Rothke on March 4, 2010

    I am presenting at the RSA PechaKucha Happy Hour tonight - Thurs. March 4, 2010 on ‘Tales from the Info Security Reading Room: Most of the Best and a Little of the Worst' Knowledge is power. A great way to become a powerful security professional is by reading. But what books should a busy security professional be reading? http://www.rsaconference.com/2010/usa/agenda-and-sessions/pecha-kucha-hap…

  • Human Factors in the Design and Evaluation of Central Control Room Operations

    by Ben Rothke on March 2, 2010

    Human Factors in the Design and Evaluation of Central Control Room Operations is an invaluable reference that can be used for the design, assessment, evaluation an operations of NOCs and SOCs. In aviation today, technically advanced airplanes present a unique paradox. Technically advanced airplanes, in theory, have more available safety, and the outcome should be that there are less accidents. …

  • The Myth of Homeland Security

    by Ben Rothke on February 25, 2010

    The Myth of Homeland Security helps you find out if true homeland security is achievable. Every decade or so, a book comes out that fundamentally changes the way we look at an issue. Examples include Upton Sinclair's The Jungle, Rachel Carson's Silent Spring, and Ralph Nader's Unsafe at Any Speed; these books are timeless in their influence. The Myth of Homeland Security by noted information…

  • Building Secure Software: How to Avoid Security Problems the Right Way

    by Ben Rothke on February 25, 2010

    Building Secure Software: How to Avoid Security Problems the Right Way is an an Indictment for Applications Development. Many transformations begin with an indictment. Two notable examples are Martin Luther's "95 Theses" criticizing the Catholic Church, which began the Reformation, and Ralph Nader's denunciation of the auto industry with "Unsafe at Any Speed." An indictment of the software…

  • Preview - Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

    by Ben Rothke on February 19, 2010

    I just got a copy of Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. It is one of those true thrillers that is hard to put down. At 260 pages, it is an easy read. The book is a compelling story of the early days of the DDoS wars and how Barrett Lyon tracked down the Russian perpetrators of the attacks. So far, seems like a really good read.

  • On deceptive email I get from VeriSign

    by Ben Rothke on February 19, 2010

    VeriSign has long touted themselves as the company of trust. It is pervasive in their advertising, marketing literature, and in their corporate mission statements. Yet for years, VeriSign has been sending marketing emails that are deceptive. Note the email I just got with the subject: Give us 4 minutes, we'll give you a 4GB USB flash drive. That sounds like a pretty reasonable offer, and one would…

  • Security Warrior

    by Ben Rothke on February 17, 2010

    Security Warrior is an excellent security reference. As is the case in the physical world, when providing computer security the optimal approach is to be proactive. Security Warrior is about taking such a preventive approach to computer predators. Attackers are often highly skilled, and the authors have adopted the premise that the only way to defend a network is to understand the motives of a…

  • Forensic Discovery

    by Ben Rothke on February 16, 2010

    When most people think of forensics, television shows like Quincy and CSI come to mind. Where such shows deviate from reality is the unrealistic speed at which the actors are able to identify, apprehend and prosecute the perpetrators. In the real world, (unlike television, where the crime must be solved by the end of the family hour), crimes are solved with slow, deliberate and methodical steps. …

  • New Information Security Lawsuit -- Why Now?

    by Stephen Wu on February 16, 2010

    Over the years, many have doubted whether we will see substantial, real-dollar information security lawsuits. Some said that companies don't want to be embarrassed by filing suit and having to admit in their complaints that they've been hacked. Others said there's no money in it for potential plaintiffs (and plaintiffs' attorneys). In my opinion, I always thought we'd see plaintiffs filing cases…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 22 Jul 2014 21:11:56 -0400.
© 2014 EMC Corporation. All rights reserved.