Menu

Blogs

Showing Blog Posts: 1–10 of 434 by Ben Rothke

Ben Rothke

Ben Rothke

  • Ben's Book of the Month: Review of "Practical Cloud Security: A Guide for Secure Design and Deployment"

    by Ben Rothke on June 30, 2019

    It was not that long ago, that if you wanted to build a data center with a 1,000 servers and 200 terabytes of storage; it would take about a year or so of planning to get such a design into production. With the advent of cloud services such as the Google Cloud Platform, Amazon Web Services and others, one can create such an infrastructure in hours. Yet with the ease of cloud deployments, security…

  • Book review: The Official (ISC)² Guide to the CISSP CBK Reference

    by Ben Rothke on June 18, 2019

    This is not my first review of a Certified Information Systems Security Professional (CISSP) test preparation guide, and it certainly won’t be the last. With the growing demand for information security professionals, and the often hiring requirement for certification, the CISSP is considered the gold-standard of certification in the information security space. As test takers desperately need…

  • Ben's Book of the Month: Review of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World"

    by Ben Rothke on May 31, 2019

    It’s 2019 and there still has not been a movie made about hackers, that is historically accurate and demonstrative of what hackers truly do. Should someone make Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (PublicAffairs Books 978-1541762381) into a movie, and stay true to the story, it would make a most compelling, and possibly Oscar nominated movie. Written…

  • Ben's Book of the Month: Review of "Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals"

    by Ben Rothke on April 30, 2019

    The first edition of Computer Security Basics by Deborah Russell & G.T Gangemi (O'Reilly 978-0596006693) came out almost 30 years ago. One might think that knowing those computer security basics would be enough to help them avoid being a victim today. But even if the book came out 5 years ago, so much has changed in technology in general, and information security specifically, that it would be dated…

  • Ben's Book Review: "The Linux Command Line: A Complete Introduction"

    by Ben Rothke on April 12, 2019

    An interesting observation William Shotts makes at the beginning of the 2 nd edition of The Linux Command Line: A Complete Introduction (No Starch Press 978-1593279523), is that in all of the hacking movies, one never sees the hacker using a mouse. From The Matrix to Takedown, the hackers are invariably busy at the command line. He writes that we as human beings instinctively know that the only way…

  • Ben's Book of the Month: Review of "Secure Cloud Transformation: The CIO'S Journey"

    by Ben Rothke on March 31, 2019

    In 2009, the Cloud Security Alliance (CSA) was announced and version 1.0 of their Security Guidance for Critical Areas of Focus for Cloud Computing best practices guidance was published. Full disclosure - I was a founding member of the CSA. Ten years ago, many executives and technical people were not sold on the idea of cloud computing. Many were quite suspicious of the security capabilities of…

  • You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches

    by Ben Rothke on February 28, 2019

    When I first saw the title of this book, I thought of the Warren Zevon song “Things To Do In Denver When You're Dead”. While it’s a typical sardonic Zevon tune, in You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches, (MIT Press 978-0262038850), author Josephine Wolff (professor of public policy at Rochester Institute of Technology), has written a…

  • Ben's Book of the Month: Review of "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age"

    by Ben Rothke on January 31, 2019

    The most authoritative books are often those that rely on primary sources. While there’s nothing wrong with secondary, or even tertiary sources, the nature of a primary source makes for a much better reference. In The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age (Crown 978-04-5149789), author David E. Sanger, national security correspondent for the New York Times, is also the primary…

  • Ben's Book of the Month: Review of "Malware Data Science: Attack Detection and Attribution"

    by Ben Rothke on December 31, 2018

    The proverb “Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime,” is known by almost everyone. In Malware Data Science: Attack Detection and Attribution (No Starch Press 978-1-59327-859-5), authors Joshua Saxe and Hillary Sanders artfully show the reader how not only to avoid being a victim of malicious code, but how to actively defend against it, and…

  • Millions, Billions, Zillions Defending Yourself in a World of Too Many

    by Ben Rothke on December 17, 2018

    The world of information security is awash in figures and statistics. From the estimated expensive costs of password resets, to cost of a data breach studies, the endlessly quoted Verizon Data Breach Investigation Report, to the near monthly hundreds of millions of customer’s data breaches, and countless more. For anyone who wants to understand how to effectively use data in the world of…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2019 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs/by/18/rothke on Tue, 16 Jul 2019 16:56:31 -0400.