Menu

Blogs

Showing Blog Posts: 1–10 of 412 by Ben Rothke

Ben Rothke

Ben Rothke

  • Ben's Book of the Month: Review of "Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA"

    by Ben Rothke on January 31, 2018

    One of the mistakes when questioning what Edward Snowden did, is that it is often framed in a yes or no framework. Questions like “was Snowden a patriot or a traitor?” and “was he right or wrong?” are ill-chosen given the complexity of what he did and exposed. In Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA (Brookings Institution Press 978-0815730637) author…

  • Book Review: The Woman Who Smashed Codes

    by Ben Rothke on January 19, 2018

    One of the challenges of working for the NSA, is that employees don’t have the freedom to share what they do with the professional community at large. Whether it is blogging, writing articles, participating in industry meetings or the like, NSA employees simply can’t do that. It’s not just the NSA, it pretty much every security agency of most countries. While many people think that public-key…

  • Ben's Book of the Month: Review of "Hacking the Hacker: Learn From the Experts Who Take Down Hackers"

    by Ben Rothke on December 29, 2017

    As 2017 closes, this month’s theme is hackers and threats. We focus on the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these growing information security problems. When it comes to learning the ins and outs of hacking, the various editions of Hacking Exposed are a great resource. The assorted…

  • Book review: Serious Cryptography: A Practical Introduction to Modern Encryption

    by Ben Rothke on December 13, 2017

    Philosopher Alfred North Whitehead noted that modern philosophy is simply a series of footnotes to Plato. When it comes to cryptography, much of it is simply footnotes to Bruce Schneier’s classic work Applied Cryptography: Protocols, Algorithms and Source Code in C. In Serious Cryptography: A Practical Introduction to Modern Encryption (No Starch Press 978-1593278267), Jean-Philippe Aumasson has…

  • Ben's Book of the Month: Review of "How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!"

    by Ben Rothke on November 30, 2017

    This month’s theme is security strategy & operations. Some questions include: what makes a good cybersecurity strategy? What policies and procedures should you have in place to ensure your employees, customers and sensitive data remain safe? If you believe John Trinckes in How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Auerbach Publications 978-1498783958), the…

  • Book Review: Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

    by Ben Rothke on November 17, 2017

    A recurring complaint of many executives when berating their CISO, is that they’ve spent exorbitant amounts on information security and often don’t have a lot to show for it. In Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Auerbach Publications 978-1138197893) author Barak Engel shows how these executives are at times correct. Engel has been in the information…

  • Ben's Book of the Month: Review of "From CIA to APT: An Introduction to Cyber Security"

    by Ben Rothke on October 31, 2017

    It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA…

  • Ben's Book of the Month: Review of "IT Security Risk Control Management: An Audit Preparation Plan"

    by Ben Rothke on September 29, 2017

    This month the theme is technology, and when it comes to information security, there is a whole lot of that around. From firewalls to switches, IDS to SIEM, to a lot of other hardware and software with 3 and 4-letter acronyms, technology is at the heart of information security. But how does an enterprise ensure that the huge amounts they spend are implementing good security. That is where an…

  • Ben's Book of the Month: Review of "The CISO Journey"

    by Ben Rothke on August 31, 2017

    This month’s them is professional development. Just as personal development is a journey, so too is a person’s career part of the development process. In an aptly titled book The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development (Auerbach Publications 978-1138197398), author Gene Fredriksen takes the reader on an information security journey. Fredriksen spent…

  • Book Review: Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security

    by Ben Rothke on August 17, 2017

    Anyone who has taken a computer science or programming class will likely know of Brian Kernighan. He had significant contributions to the development of Unix, and also wrote the AWK and AMPL programming languages. For the last 20 years, he’s been a professor of computer at Princeton University. He is the author of many technical books. When I got his latest book Understanding the Digital World:…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs/by/18/rothke on Thu, 22 Feb 2018 05:34:23 -0500.