Blogs

Showing Blog Posts: 111–120 of 134 tagged Cybercrime

  • My slides from the PechaKucha (PK) Happy Hour

    by Ben Rothke on March 5, 2010

    The inaugural RSA PechaKucha (PK) Happy Hour was a huge success. My slides from last night’s PK event: Knowledge is power. A great way to become a powerful security professional is by reading. But what books should a busy security professional be reading? are at https://365.rsaconference.com/docs/DOC-2508 Slides for the other presenters are at https://365.rsaconference.com/community/connect/rsa-c…

  • Tales from the Info Security Reading Room

    by Ben Rothke on March 4, 2010

    I am presenting at the RSA PechaKucha Happy Hour tonight - Thurs. March 4, 2010 on ‘Tales from the Info Security Reading Room: Most of the Best and a Little of the Worst' Knowledge is power. A great way to become a powerful security professional is by reading. But what books should a busy security professional be reading? http://www.rsaconference.com/2010/usa/agenda-and-sessions/pecha-kucha-hap…

  • The Myth of Homeland Security

    by Ben Rothke on February 25, 2010

    The Myth of Homeland Security helps you find out if true homeland security is achievable. Every decade or so, a book comes out that fundamentally changes the way we look at an issue. Examples include Upton Sinclair's The Jungle, Rachel Carson's Silent Spring, and Ralph Nader's Unsafe at Any Speed; these books are timeless in their influence. The Myth of Homeland Security by noted information…

  • Preview - Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

    by Ben Rothke on February 19, 2010

    I just got a copy of Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. It is one of those true thrillers that is hard to put down. At 260 pages, it is an easy read. The book is a compelling story of the early days of the DDoS wars and how Barrett Lyon tracked down the Russian perpetrators of the attacks. So far, seems like a really good read.

  • Security Warrior

    by Ben Rothke on February 17, 2010

    Security Warrior is an excellent security reference. As is the case in the physical world, when providing computer security the optimal approach is to be proactive. Security Warrior is about taking such a preventive approach to computer predators. Attackers are often highly skilled, and the authors have adopted the premise that the only way to defend a network is to understand the motives of a…

  • Managing an Information Security and Privacy Awareness and Training Program

    by Ben Rothke on February 12, 2010

    Managing an Information Security and Privacy Awareness and Training Program is the definitive reference on creating an information security awareness campaign and program. Managing an Information Security and Privacy Awareness and Training Program is without a doubt the definitive reference on creating an information security awareness program Behind most information security problems are users…

  • Cryptography for Dummies

    by Ben Rothke on February 11, 2010

    Cryptography for Dummies is a really good introduction to cryptography. Cryptography is one of the most intimidating aspects of computer security, conjuring up, as it does, such concepts as hash functions and public-key infrastructures. For the average user who wants to know about cryptography without gaining the proficiency of a cryptographer, Cryptography for Dummies is the perfect…

  • Hacking For Dummies

    by Ben Rothke on February 10, 2010

    Hacking For Dummies is an excellent introduction to hacking for beginners. The media often mistakenly characterize hackers as bored technical geniuses. In truth, most hackers, as the media use the term, are not geniuses; they are simply adept at downloading hacking tools that do all of the dirty work for them. These so-called script kiddies often do not know what they are doing until the damage…

  • The Many Shades of Project Grey Goose

    by Gib Sorebo on February 8, 2010

    As I noted in my previous post about a recent 60 Minutes segment, we often rely on rumor and innuendo as the basis for journalism in critical infrastructure. If a current or former high-ranking public official says he heard something, then it must be true. Unfortunately, Project Grey Goose, whose stated objective was “to answer the question of whether there has been any successful hacker attacks…

  • Cracking Down on SCADA Security

    by Gib Sorebo on January 21, 2010

    Critical infrastructure encompasses a vast array of industries and their associated platforms for control and monitoring of such critical functions as the delivery of water and electricity, operation of mass transit systems, and automation of our factories. While the devices differ, many are managed by supervisory control and data acquisition (SCADA) systems that define how transformers, braking…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 18 Dec 2014 16:41:17 -0500.
© 2014 EMC Corporation. All rights reserved.