Ben’s Book of the Month: Review of “The Truth Machine: The Blockchain and the Future of Everything”

|
The hype cycle is a branded graphical presentation developed and used by Gartner to represent the maturity, adoption and social application of specific technologies. The five phases of the hype cycle are: Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity The 2017 Hype ... Read More

Ben’s Book of the Month: Review of “A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using”

|
In the world of information security, the ability to actually implement something and bring ideas to fruition, is commendable. In A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using (ISBN 978-1549836534), author Roger A. Grimes take his decades of experience and give the reader excellent advice ... Read More

Ben’s Book of the Month: Review of “Zero Trust Networks: Building Secure Systems in Untrusted Networks”

|
The notion of a zero trust networks (ZTN) was created in 2010 by John Kindervag, then of Forrester. Kindervag felt that as enterprises moved slowly towards a data-centric world with shifting threats and perimeters, a new concept of what constituted a secure network had to be created. It was ahead ... Read More

Ben’s Book of the Month: Review of “InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe”

|
To address the lack of women in cyber security, a new book is out dealing with that in InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Rethink Press 978-1781332696) by Jane Frankland. In this interesting book, she brings to light detail ... Read More

Ben’s Book of the Month: Review of “Machine Learning and Security: Protecting Systems with Data and Algorithms”

Machine learning and security are all the rage. With the RSA Conference a little more than 2 weeks away, there will be plenty of firms on the expo floor touting their security solutions based on AI, deep learning, and machine learning. In Machine Learning and Security: Protecting Systems with Data ... Read More

Ben’s Book of the Month: Review of “The EU General Data Protection Regulation (GDPR): A Practical Guide”

It was about 20 years ago that the Y2K problem had firms scrambling to fix the issue. At its core, it was a rather simple problem to fix. Firms just had to change a 2-digit year field to a 4-digit field. But the devil, as always, was in the details ... Read More

Ben’s Book of the Month: Review of “Securing DevOps: Safe Services in The Cloud”

| | security bloggers network
Last year, one of my book of the month selections was The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations (IT Revolution Press 978-1942788003), by Gene Kim, Patrick Debois, John Willis and Jez Humble. As noted at DevOpsSec, the challenge facing DevOps teams today, however, ... Read More

Ben’s Book of the Month: Review of “Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA”

One of the mistakes when questioning what Edward Snowden did, is that it is often framed in a yes or no framework. Questions like “was Snowden a patriot or a traitor?” and “was he right or wrong?” are ill-chosen given the complexity of what he did and exposed. In Beyond ... Read More

Book Review: The Woman Who Smashed Codes

One of the challenges of working for the NSA, is that employees don’t have the freedom to share what they do with the professional community at large. Whether it is blogging, writing articles, participating in industry meetings or the like, NSA employees simply can’t do that. It’s not just the ... Read More

Ben’s Book of the Month: Review of “Hacking the Hacker: Learn From the Experts Who Take Down Hackers”

| | security bloggers network
As 2017 closes, this month’s theme is hackers and threats. We focus on the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these growing information security problems. When it comes to learning the ins and outs of hacking, the various ... Read More
Loading...