Quantcast
Channel: Blog Posts From Ben Rothke: Security Reading Room Tagged With information
Browsing latest articles
Browse All 6 View Live

ISO27001 in a Windows Environment

Imagine auto racing where none of the pit crew did things in synchronicity. No driver would keep such a crew. Yet in the world of IT, many firms have staff administering Windows systems, each...

View Article



PRAGMATIC Security Metrics: Applying Metametrics to Information Security

Like all books on metrics, early in the book in PRAGMATIC Security Metrics: Applying Metametrics to Information Security makes the statement that “you can't manage what you can't measure”.  The authors...

View Article

Managing Risk and Information Security: Protect to Enable

Risk management in the real world is not an easy endeavor.  On one side, people use toilet seat covers thinking they do something, on the other side, millions of people smoke cigarettes, ignoring the...

View Article

Applied Information Security: A Hands-on Approach

In Applied Information Security: A Hands-on Approach, authors David Basin, Patrick Schaller and Michael Schläpfer detail some of the labs exercises and texts that they used for courses they gave at ETH...

View Article

Locked Down: Information Security for Lawyers

HadLocked Down: Information Security for Lawyers not been published by the American Bar Association (ABA) and 2 of its 3 authors not been attorneys; one would have thought the book is a reproach...

View Article


Chinese Information War: Espionage, Cyberwar, Communications Control and...

It’s said that truth is stranger than fiction, as fiction has to make sense.  Had The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests...

View Article
Browsing latest articles
Browse All 6 View Live




Latest Images