Blogs

  • The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    by Ben Rothke on December 14, 2009

    My book review of The Myths of Security: What the Computer Security Industry Doesn't Want You to Know by John Viega was on Slashdot. The book is an interesting and thought-provoking. Ultimately, the state of information security can be summed up in the book's final three sentences, in which John Viega writes that “real, timely improvement is possible, but it requires people to care a lot more…

  • Disputes About Production of Files in Native Format

    by Stephen Wu on December 13, 2009

    It's a familiar dispute in cases involving eDiscovery. One party asks the other side to turn over electronically stored information (ESI) in native file format, and the other party wants to turn over ESI in a different format. By "native" file format, I am referring to the format in which the ESI was created and saved by the application producing it. What if the requesting party and the producing…

  • Book review of Confessions of a Public Speaker

    by Ben Rothke on December 12, 2009

    While there is a plethora of books such as Public Speaking for Dummies, and many similar titles,Confessions of a Public Speaker is unique in that it takes a holistic approach to the art and science of public speaking. The book doesn't just provide helpful hints, it attempts to make the speaker, and his associated presentation, compelling and necessary. Confessions is Scott Berkun's first-hand…

  • Welcome to the Security Reading Room blog

    by Ben Rothke on December 12, 2009

    Welcome to the Security Reading Room blog. I have been writing book reviews since 2000, when I wrote by first reviews, which were for Looking into Windows NT: A Before-You-Leap Guide to Microsoft's Network Solution by Steven Levenson and Windows NT Security Guide by Stephen Sutton. In the last few years, most of my reviews have appeared on Slashdot and Security Managementmagazine. I also cross post…

  • The best information security book I ever read is….

    by Ben Rothke on December 12, 2009

    Hands down, the best book I have read to date is Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson. The second edition came out in 2008. If you are looking for 50 pages of screen prints on how to install and configure a printer under Windows, this is the wrong book for that. What Anderson does, in great detail and with lucidity, is particularizing all of the…

  • Lifelogging Devices May Revolutionize Court Testimony

    by Stephen Wu on December 2, 2009

    Business Week recently published an article about a Microsoft researcher, Gordon Bell, who walks around with a device called a SenseCam around his neck that snaps pictures every 20 seconds or so, along with a device that records audio conversations. Click here for the article and here for a related article in TechCrunch. In essence, the device records the daily events of Bell's life, which Bell can…

  • Going Old School

    by Gib Sorebo on December 2, 2009

    The world of information technology and electronics has produced spectacular advancements in the way we live. Technologies that once required human intervention can now be automated with the tasks to be performed hidden from view. While that has made our lives easier, it doesn’t always pique our curiosity. We have to admit that it’s usually a lot more fun to watch a demonstration where something…

  • CFATS: Is the Danger Real?

    by Gib Sorebo on November 30, 2009

    As we get closer to the RSA Conference in March, I want to highlight some of the topics scheduled to be part of the Physical Security and Critical Infrastructure track. The subjects cover an array of issues from lock picking to the integrity of the electrical grid. One topic that is gaining increasing attention is the security of chemical plants. Given the potential terrorist applications of…

  • Google Chrome OS Foreshadows Complete eDiscovery Overhaul

    by Stephen Wu on November 23, 2009

    Last week, Google hosted a press event to answer questions about the upcoming rollout of Google Chrome OS. We've heard rumblings about the supposed Microsoft-supplanting technology for years -- a browser-based OS, "your browser is your operating system," "the web browser is the most important program on your computer," use web apps instead of (Microsoft) boxed or pre-loaded locally-operating…

  • Survey Shows More than Half of US Businesses Are Not Prepared for eDiscovery

    by Stephen Wu on November 16, 2009

    On October 21, 2009, Kroll Ontrack announced the results of an eDiscovery readiness survey of "commercial businesses" in the US and UK. Most of the surveyed businesses have a document retention policy, but fewer than half (46% of the surveyed US businesses) say that they have an "eDiscovery readiness strategy." For a link to the Kroll Ontrack press release announcing the survey, click here. You can…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 25 Jul 2014 23:06:11 -0400.
© 2014 EMC Corporation. All rights reserved.