Stories by Ben Rothke

The CSA is the new VIP of information security

In the piece I wrote in December ("What the Sony breach means for security in 2015"), I noted that while a good CISO is important; great security architects are critical. While a CISO may get the glory; security architects are what most organizations need.

Ben Rothke | 10 Jul | Read more

Do CISSPs make good life insurance agents?

In January, I updated my profile on a popular job board. While the information security space is quite hot and my inbox was quite busy, I also got a number of emails from left field. Over the course of a few weeks, I also received over 25 emails from some of the most prominent life insurance firms in the US, including:

Ben Rothke | 02 Jun | Read more

How to get CVSS right

For anyone dealing with software vulnerabilities, the CVE and CVSS are often their first stops in finding out the scope and details, and just about everything else they need to know about the specific vulnerability.

Ben Rothke | 16 Apr | Read more

It's time for a National Cybersecurity Safety Board (NCSB)

In his book The Psychological Edge: Strategies For Everyday Living, clinical psychologist Dr. Samuel Shein writes that while we have a National Transportation Safety Board (NTSB), there is no National Psychological Research Board (NPRB). A group like the NPRB could investigate national disasters caused by those with psychological issues.

Ben Rothke | 20 Feb | Read more

What the Sony breach means for security in 2015

The recent (and perhaps ongoing) Sony breach was certainly one of the worst corporate data breaches we have seen to date. As 2014 draws to a close, no one knows the details with certainty of who the perpetrator was. Even so, it's undeniable that it's a breach that will forever change the way Sony does business.

Ben Rothke | 24 Dec | Read more

Money transfers, creative scammers, and fraud

In Fitness for Geeks: Real Science, Great Nutrition, and Good Health, author Bruce Perry writes of Tabata sprints, an ultra-intense exercise that has dramatic benefits. But however effective they may be, even Izumi Tabata himself felt that given their difficulty, only the most serious athletes would use them.

Ben Rothke | 12 Jul | Read more

Why Information Must Be Destroyed, Part Two

In the first installment of Why Information Must Be Destroyed I discussed how not discarding worthless hard copy documents, even though they appear to have no value is a security risk. While this is true for physical hard copies, it is even more relevant for digitally stored data.

Ben Rothke | 07 May | Read more

Why Information Must Be Destroyed

The inability to discard worthless items even though they appear to have no value is known as compulsive hoarding syndrome. Ben Rothke explains why it's a bad habit in the world of IT security.

Ben Rothke | 25 Feb | Read more