Menu

Blogs

Showing Blog Posts: 1–10 of 147 tagged Book Review

  • Ben's Book of the Month: Review of "Machine Learning and Security: Protecting Systems with Data and Algorithms"

    by Ben Rothke on March 30, 2018

    Machine learning and security are all the rage. With the RSA Conference a little more than 2 weeks away, there will be plenty of firms on the expo floor touting their security solutions based on AI, deep learning, and machine learning. In Machine Learning and Security: Protecting Systems with Data and Algorithms (O'Reilly Media 978-1491979907), authors Clarence Chio and David Freeman have written…

  • Ben's Book of the Month: Review of "The EU General Data Protection Regulation (GDPR): A Practical Guide"

    by Ben Rothke on March 16, 2018

    It was about 20 years ago that the Y2K problem had firms scrambling to fix the issue. At its core, it was a rather simple problem to fix. Firms just had to change a 2-digit year field to a 4-digit field. But the devil, as always, was in the details and firms struggled to understand how many applications they had, and where the date fields resided in their massive code base. Many Fortune 500 firms…

  • Ben's Book of the Month: Review of "Securing DevOps: Safe Services in The Cloud"

    by Ben Rothke on February 28, 2018

    Last year, one of my book of the month selections was The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations (IT Revolution Press 978-1942788003), by Gene Kim, Patrick Debois, John Willis and Jez Humble. As noted at DevOpsSec, the challenge facing DevOps teams today, however, is that incorporating security into their day-to-day work is not…

  • Book Review: The Woman Who Smashed Codes

    by Ben Rothke on January 19, 2018

    One of the challenges of working for the NSA, is that employees don’t have the freedom to share what they do with the professional community at large. Whether it is blogging, writing articles, participating in industry meetings or the like, NSA employees simply can’t do that. It’s not just the NSA, it pretty much every security agency of most countries. While many people think that public-key…

  • Book review: Serious Cryptography: A Practical Introduction to Modern Encryption

    by Ben Rothke on December 13, 2017

    Philosopher Alfred North Whitehead noted that modern philosophy is simply a series of footnotes to Plato. When it comes to cryptography, much of it is simply footnotes to Bruce Schneier’s classic work Applied Cryptography: Protocols, Algorithms and Source Code in C. In Serious Cryptography: A Practical Introduction to Modern Encryption (No Starch Press 978-1593278267), Jean-Philippe Aumasson has…

  • Book Review: Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

    by Ben Rothke on November 17, 2017

    A recurring complaint of many executives when berating their CISO, is that they’ve spent exorbitant amounts on information security and often don’t have a lot to show for it. In Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Auerbach Publications 978-1138197893) author Barak Engel shows how these executives are at times correct. Engel has been in the information…

  • Ben's Book of the Month: Review of "From CIA to APT: An Introduction to Cyber Security"

    by Ben Rothke on October 31, 2017

    It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA…

  • Book Review: Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security

    by Ben Rothke on August 17, 2017

    Anyone who has taken a computer science or programming class will likely know of Brian Kernighan. He had significant contributions to the development of Unix, and also wrote the AWK and AMPL programming languages. For the last 20 years, he’s been a professor of computer at Princeton University. He is the author of many technical books. When I got his latest book Understanding the Digital World:…

  • NTP Security: A Quick-Start Guide

    by Ben Rothke on May 2, 2017

    What does stand-up comedy, networking and internet security have in common? Their ultimate success depends a lot on timing. When it comes to comedy, timing is measured in seconds. In networking and security, it’s in milliseconds. The use of the Network Time Protocol (NTP) has long been the gold-standard for network time synchronization. It’s been in use since the early 1980’s and is one of the…

  • American Spies: Modern Surveillance, Why You Should Care, and What to Do About It

    by Ben Rothke on March 6, 2017

    Return on investment (ROI) is a measure used to evaluate the efficiency of an investment. It measures the amount of return on an investment relative to its cost. To calculate ROI, the return of an investment is divided by the cost of the investment, and the result is expressed as a percentage or a ratio. If anyone would attempt to gauge the ROI spent by the National Security Agency (NSA) and…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 20 Apr 2018 10:27:01 -0400.