Menu

Blogs

Showing Blog Posts: 1–10 of 160 tagged Book Review

  • Ben's Book Review: "The Linux Command Line: A Complete Introduction"

    by Ben Rothke on April 12, 2019

    An interesting observation William Shotts makes at the beginning of the 2 nd edition of The Linux Command Line: A Complete Introduction (No Starch Press 978-1593279523), is that in all of the hacking movies, one never sees the hacker using a mouse. From The Matrix to Takedown, the hackers are invariably busy at the command line. He writes that we as human beings instinctively know that the only way…

  • Ben's Book of the Month: Review of "Secure Cloud Transformation: The CIO'S Journey"

    by Ben Rothke on March 31, 2019

    In 2009, the Cloud Security Alliance (CSA) was announced and version 1.0 of their Security Guidance for Critical Areas of Focus for Cloud Computing best practices guidance was published. Full disclosure - I was a founding member of the CSA. Ten years ago, many executives and technical people were not sold on the idea of cloud computing. Many were quite suspicious of the security capabilities of…

  • You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches

    by Ben Rothke on February 28, 2019

    When I first saw the title of this book, I thought of the Warren Zevon song “Things To Do In Denver When You're Dead”. While it’s a typical sardonic Zevon tune, in You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches, (MIT Press 978-0262038850), author Josephine Wolff (professor of public policy at Rochester Institute of Technology), has written a…

  • Ben's Book of the Month: Review of "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age"

    by Ben Rothke on January 31, 2019

    The most authoritative books are often those that rely on primary sources. While there’s nothing wrong with secondary, or even tertiary sources, the nature of a primary source makes for a much better reference. In The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age (Crown 978-04-5149789), author David E. Sanger, national security correspondent for the New York Times, is also the primary…

  • Ben's Book of the Month: Review of "Malware Data Science: Attack Detection and Attribution"

    by Ben Rothke on December 31, 2018

    The proverb “Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime,” is known by almost everyone. In Malware Data Science: Attack Detection and Attribution (No Starch Press 978-1-59327-859-5), authors Joshua Saxe and Hillary Sanders artfully show the reader how not only to avoid being a victim of malicious code, but how to actively defend against it, and…

  • Millions, Billions, Zillions Defending Yourself in a World of Too Many

    by Ben Rothke on December 17, 2018

    The world of information security is awash in figures and statistics. From the estimated expensive costs of password resets, to cost of a data breach studies, the endlessly quoted Verizon Data Breach Investigation Report, to the near monthly hundreds of millions of customer’s data breaches, and countless more. For anyone who wants to understand how to effectively use data in the world of…

  • Ben's Book of the Month: Review of "Click Here to Kill Everybody: Security and Survival in a Hyper-connected World"

    by Ben Rothke on November 30, 2018

    Perhaps the most meaningless term in information security is though leader. I know what it is supposed to mean, but many people who consider themselves information security thought leaders are anything but that. Nonetheless, if there is anyone who is a thought leader in the true sense of the term, it’s Bruce Schneier. Schneier has written on near every aspect of information security. From…

  • Ben's Book of the Month: Review of "Social Engineering: The Science of Human Hacking"

    by Ben Rothke on August 31, 2018

    There is a story about Harry Houdini, that he once failed to escape from a jail cell, even though the door was unlocked. The reason he stayed trapped is that he only knew how to get out of locked doors. In the world of technology, there are indeed many locked doors, and social engineers know how to open them. In the domain of social engineering, Christopher Hadnagy is one of the best. I’ve…

  • Ben's Book of the Month: Review of "Cyber Wars: Hacks that Shocked the Business World"

    by Ben Rothke on August 14, 2018

    The only problem I have with Cyber Wars: Hacks that Shocked the Business World (Kogan Page 978-0749482008) by Charles Arthur is that these breaches really didn’t shock the information security community or the business world. These stories are simply narratives of firms that didn’t take information security seriously and suffered the consequences. In this interesting book, he details some of the…

  • Ben's Book of the Month: Review of "The Truth Machine: The Blockchain and the Future of Everything"

    by Ben Rothke on July 31, 2018

    The hype cycle is a branded graphical presentation developed and used by Gartner to represent the maturity, adoption and social application of specific technologies. The five phases of the hype cycle are: Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity The 2017 Hype Cycle for Emerging Technologies has blockchain in the Peak…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 & 2019 Editorial Calendars for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 24 Apr 2019 12:12:03 -0400.