Blogs

  • Book review of Confessions of a Public Speaker

    by Ben Rothke on December 12, 2009

    While there is a plethora of books such as Public Speaking for Dummies, and many similar titles,Confessions of a Public Speaker is unique in that it takes a holistic approach to the art and science of public speaking. The book doesn't just provide helpful hints, it attempts to make the speaker, and his associated presentation, compelling and necessary. Confessions is Scott Berkun's first-hand…

  • Welcome to the Security Reading Room blog

    by Ben Rothke on December 12, 2009

    Welcome to the Security Reading Room blog. I have been writing book reviews since 2000, when I wrote by first reviews, which were for Looking into Windows NT: A Before-You-Leap Guide to Microsoft's Network Solution by Steven Levenson and Windows NT Security Guide by Stephen Sutton. In the last few years, most of my reviews have appeared on Slashdot and Security Managementmagazine. I also cross post…

  • The best information security book I ever read is….

    by Ben Rothke on December 12, 2009

    Hands down, the best book I have read to date is Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson. The second edition came out in 2008. If you are looking for 50 pages of screen prints on how to install and configure a printer under Windows, this is the wrong book for that. What Anderson does, in great detail and with lucidity, is particularizing all of the…

  • Going Old School

    by Gib Sorebo on December 2, 2009

    The world of information technology and electronics has produced spectacular advancements in the way we live. Technologies that once required human intervention can now be automated with the tasks to be performed hidden from view. While that has made our lives easier, it doesn’t always pique our curiosity. We have to admit that it’s usually a lot more fun to watch a demonstration where something…

  • Lifelogging Devices May Revolutionize Court Testimony

    by Stephen Wu on December 2, 2009

    Business Week recently published an article about a Microsoft researcher, Gordon Bell, who walks around with a device called a SenseCam around his neck that snaps pictures every 20 seconds or so, along with a device that records audio conversations. Click here for the article and here for a related article in TechCrunch. In essence, the device records the daily events of Bell's life, which Bell can…

  • CFATS: Is the Danger Real?

    by Gib Sorebo on November 30, 2009

    As we get closer to the RSA Conference in March, I want to highlight some of the topics scheduled to be part of the Physical Security and Critical Infrastructure track. The subjects cover an array of issues from lock picking to the integrity of the electrical grid. One topic that is gaining increasing attention is the security of chemical plants. Given the potential terrorist applications of…

  • Google Chrome OS Foreshadows Complete eDiscovery Overhaul

    by Stephen Wu on November 23, 2009

    Last week, Google hosted a press event to answer questions about the upcoming rollout of Google Chrome OS. We've heard rumblings about the supposed Microsoft-supplanting technology for years -- a browser-based OS, "your browser is your operating system," "the web browser is the most important program on your computer," use web apps instead of (Microsoft) boxed or pre-loaded locally-operating…

  • Survey Shows More than Half of US Businesses Are Not Prepared for eDiscovery

    by Stephen Wu on November 16, 2009

    On October 21, 2009, Kroll Ontrack announced the results of an eDiscovery readiness survey of "commercial businesses" in the US and UK. Most of the surveyed businesses have a document retention policy, but fewer than half (46% of the surveyed US businesses) say that they have an "eDiscovery readiness strategy." For a link to the Kroll Ontrack press release announcing the survey, click here. You can…

  • More FUD from the Mainstream Media?

    by Gib Sorebo on November 11, 2009

    Many of you may have watched the “60 Minutes” segment on Sunday entitled “Sabotaging the System.” The 20-minute segment highlighted a number of alleged past and potential cyber attacks, including power outages in Brazil, an attack on the military’s Central Command, and theft of millions through hacks of ATM networks. Beyond somelegitimate disputes as to whether the Brazilian blackouts were caused…

  • Massachusetts Issues Final Data Security Regulations

    by Stephen Wu on November 6, 2009

    On November 4, 2009, the Massachusetts Office of Consumer Affairs and Business Regulations announced that it promulgated final data security regulations to take effect on March 1, 2009. In a previous blog post, I described imminent changes to the regulations and some of the history of the Massachusetts regulations. The final regulations appear at Title 201 of the Code of Massachusetts Regulations, …

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 30 Aug 2014 04:09:22 -0400.
© 2014 EMC Corporation. All rights reserved.