Menu

Blogs

Showing Blog Posts: 1–10 of 407 by Ben Rothke

Ben Rothke

Ben Rothke

  • Book Review: Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

    by Ben Rothke on November 17, 2017

    A recurring complaint of many executives when berating their CISO, is that they’ve spent exorbitant amounts on information security and often don’t have a lot to show for it. In Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Auerbach Publications 978-1138197893) author Barak Engel shows how these executives are at times correct. Engel has been in the information…

  • Ben's Book of the Month: Review of "From CIA to APT: An Introduction to Cyber Security"

    by Ben Rothke on October 31, 2017

    It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA…

  • Ben's Book of the Month: Review of "IT Security Risk Control Management: An Audit Preparation Plan"

    by Ben Rothke on September 29, 2017

    This month the theme is technology, and when it comes to information security, there is a whole lot of that around. From firewalls to switches, IDS to SIEM, to a lot of other hardware and software with 3 and 4-letter acronyms, technology is at the heart of information security. But how does an enterprise ensure that the huge amounts they spend are implementing good security. That is where an…

  • Ben's Book of the Month: Review of "The CISO Journey"

    by Ben Rothke on August 31, 2017

    This month’s them is professional development. Just as personal development is a journey, so too is a person’s career part of the development process. In an aptly titled book The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development (Auerbach Publications 978-1138197398), author Gene Fredriksen takes the reader on an information security journey. Fredriksen spent…

  • Book Review: Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security

    by Ben Rothke on August 17, 2017

    Anyone who has taken a computer science or programming class will likely know of Brian Kernighan. He had significant contributions to the development of Unix, and also wrote the AWK and AMPL programming languages. For the last 20 years, he’s been a professor of computer at Princeton University. He is the author of many technical books. When I got his latest book Understanding the Digital World:…

  • Ben's Book of the Month: Review of "Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency"

    by Ben Rothke on July 31, 2017

    This month’s book of the month theme is security strategy & operations. Without a strategy and effective operations; there is no information security. The Major League Baseball All-Star game is somewhat of an oddity. You take all of the best players, and have them play together for one night. For the rest of the season, what often separate a winning team from a losing one, is the ability of not…

  • The Hardware Hacker: Adventures in Making and Breaking Hardware

    by Ben Rothke on July 17, 2017

    Trying to place The Hardware Hacker: Adventures in Making and Breaking Hardware (No Starch Press 978-1593277581) into a specific category is a challenge. This superb book covers a multitude of topics, from hardware engineering, software design, Chinese manufacturing, to hardware hacking, product development, intellectual property law and more. In the book, author Andrew 'bunnie' Huang details his…

  • Ben's Book of the Month: Review of "Information Security Policies Made Easy"

    by Ben Rothke on June 30, 2017

    This month’s theme is policy & government. As information security becomes even more important in government, business and life, information security policies are being developed to combat the emerging threats and regulate industry. The importance of effective information security policies cannot be overemphasized, as they are the foundation toward implementing information security and ensuring the…

  • Ben's Book of the Month: Review of "CISO Desk Reference Guide: A Practical Guide for CISOs"

    by Ben Rothke on May 31, 2017

    While the classic prepare 3 envelopes joke revolves around a CEO, it’s quite appropriate for a CISO. For many CISO, their career path is a slow and steady one where they deliberately progress into that role. For others, they often quickly obtain the role due to a major security breach that requires that envelope #3 be opened. In the CISO Desk Reference Guide: A Practical Guide for CISOs (CISO DRG…

  • NTP Security: A Quick-Start Guide

    by Ben Rothke on May 2, 2017

    What does stand-up comedy, networking and internet security have in common? Their ultimate success depends a lot on timing. When it comes to comedy, timing is measured in seconds. In networking and security, it’s in milliseconds. The use of the Network Time Protocol (NTP) has long been the gold-standard for network time synchronization. It’s been in use since the early 1980’s and is one of the…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2017 Editorial Calendar or 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs/by/18/rothke on Tue, 21 Nov 2017 10:33:32 -0500.
© 2017 EMC Corporation. All rights reserved.