Menu

Blogs

Showing Blog Posts: 1–10 of 428 by Ben Rothke

Ben Rothke

Ben Rothke

  • You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches

    by Ben Rothke on February 28, 2019

    When I first saw the title of this book, I thought of the Warren Zevon song “Things To Do In Denver When You're Dead”. While it’s a typical sardonic Zevon tune, in You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches, (MIT Press 978-0262038850), author Josephine Wolff (professor of public policy at Rochester Institute of Technology), has written a…

  • Ben's Book of the Month: Review of "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age"

    by Ben Rothke on January 31, 2019

    The most authoritative books are often those that rely on primary sources. While there’s nothing wrong with secondary, or even tertiary sources, the nature of a primary source makes for a much better reference. In The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age (Crown 978-04-5149789), author David E. Sanger, national security correspondent for the New York Times, is also the primary…

  • Ben's Book of the Month: Review of "Malware Data Science: Attack Detection and Attribution"

    by Ben Rothke on December 31, 2018

    The proverb “Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime,” is known by almost everyone. In Malware Data Science: Attack Detection and Attribution (No Starch Press 978-1-59327-859-5), authors Joshua Saxe and Hillary Sanders artfully show the reader how not only to avoid being a victim of malicious code, but how to actively defend against it, and…

  • Millions, Billions, Zillions Defending Yourself in a World of Too Many

    by Ben Rothke on December 17, 2018

    The world of information security is awash in figures and statistics. From the estimated expensive costs of password resets, to cost of a data breach studies, the endlessly quoted Verizon Data Breach Investigation Report, to the near monthly hundreds of millions of customer’s data breaches, and countless more. For anyone who wants to understand how to effectively use data in the world of…

  • Ben's Book of the Month: Review of "Click Here to Kill Everybody: Security and Survival in a Hyper-connected World"

    by Ben Rothke on November 30, 2018

    Perhaps the most meaningless term in information security is though leader. I know what it is supposed to mean, but many people who consider themselves information security thought leaders are anything but that. Nonetheless, if there is anyone who is a thought leader in the true sense of the term, it’s Bruce Schneier. Schneier has written on near every aspect of information security. From…

  • Ben's Book of the Month: Review of "Security without Obscurity: A Guide to Cryptographic Architectures"

    by Ben Rothke on October 31, 2018

    It’s been a little over four years since author J.J. Stapleton wrote the second in his Security without Obscurity series in A Guide to Confidentiality, Authentication and Integrity (Auerbach Publications 978-1466592148). In the just released third volume of the series, Security without Obscurity: A Guide to Cryptographic Architectures(Auerbach Publications 978-0815396413), Stapleton has again…

  • Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

    by Ben Rothke on September 28, 2018

    For those in the New York City area, they know the tagline from radio station 1010 WINS “you give us 22 minutes, we'll give you the world”. It’s no exaggeration to claim that one could create a significantly size cloud-based IT infrastructure in AWS in 22 minutes. It’s also no exaggeration to claim that such an infrastructure would be seriously lacking in security and privacy controls. In …

  • Ben's Book of the Month: Review of "Social Engineering: The Science of Human Hacking"

    by Ben Rothke on August 31, 2018

    There is a story about Harry Houdini, that he once failed to escape from a jail cell, even though the door was unlocked. The reason he stayed trapped is that he only knew how to get out of locked doors. In the world of technology, there are indeed many locked doors, and social engineers know how to open them. In the domain of social engineering, Christopher Hadnagy is one of the best. I’ve…

  • Ben's Book of the Month: Review of "Cyber Wars: Hacks that Shocked the Business World"

    by Ben Rothke on August 14, 2018

    The only problem I have with Cyber Wars: Hacks that Shocked the Business World (Kogan Page 978-0749482008) by Charles Arthur is that these breaches really didn’t shock the information security community or the business world. These stories are simply narratives of firms that didn’t take information security seriously and suffered the consequences. In this interesting book, he details some of the…

  • Ben's Book of the Month: Review of "The Truth Machine: The Blockchain and the Future of Everything"

    by Ben Rothke on July 31, 2018

    The hype cycle is a branded graphical presentation developed and used by Gartner to represent the maturity, adoption and social application of specific technologies. The five phases of the hype cycle are: Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity The 2017 Hype Cycle for Emerging Technologies has blockchain in the Peak…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 & 2019 Editorial Calendars for more info. 

This document was retrieved from http://www.rsaconference.com/blogs/by/18/rothke on Mon, 25 Mar 2019 10:08:12 -0400.