Ben Rothke, Tapad

Ben Rothke

Tapad

United States

Contact Ben

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Tapad
  • The Times of Israel
  • CSOonline
  • CIO.com

Past articles by Ben:

Ransomware — why it’s so easy and makes so much economic sense

Travelex, one of the largest foreign exchange companies, the ones you see in almost every airport, has been brought to its knees by the Sodinokibi ransomware strain. Until recently, delivering the… → Read More

Book review: Why Open Orthodoxy is not Orthodox

Cardinal Richelieu was a 16th-century French statesman who said that “if you give me six lines written...... → Read More

The rise of the cheap information security officer

When it comes to hiring a CISO, firms get what they pay for. And they’ll have to live with the consequences when they try to be security misers. → Read More

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security professionals. → Read More

Introducing the Cybersecurity Canon

Last month David Bisson wrote a blog post 10 Must-Read Books for Information Security Professionals, where he asked information security professionals their must-read book. There’s a number of books listed there that are definitely worth a read. → Read More

Gadi Tirosh on the secrets of Israeli information security innovation

In my previous piece I provided some insights on how Israel has become an information security innovation powerhouse. In closing the topic, I’ll share some insights from Gadi Tirosh who is a managing partner at Jerusalem Venture Partners (JVC); an international venture capital firm based in Jerusalem. → Read More

Israel government spurs innovation

See how Israel has become a leading player in the worldwide information security sector. → Read More

Without information security processes, you are flying blind

When done well, the creation of an information security process catalog can provide significant benefits for an enterprise. → Read More

Practical tips to ensure PCI DSS compliance when dealing with message queues

In this final piece, David Mundhenk and I will continue with some more detailed items on how to ensure PCI message queue compliance. → Read More

A guide to the RSA 2016 conference

Going to RSA 2016? Failing to plan is planning to fail. → Read More

How to ensure PCI DSS compliance when dealing with message queues

To queue or not to queue, that is the PCI question – part 2 by David Mundhenk and Ben Rothke → Read More

CyberTech – The Golden Globes of information security

Here’s some of the most interesting firms I met with while at the CyberTech conference. → Read More

To queue or not to queue, that is the PCI question

In the first of this three-part series, David Mundhenk and I will detail issues surrounding message queuing and how to ensure it doesn’t break your PCI DSS compliance effort. → Read More

Live from Tel Aviv, it’s CyberTech

I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account. → Read More

How physicians can do no harm using social media

In this article, I’ll offer some practical advice on how physicians and others in healthcare can use social media without running afoul of their HIPAA compliance office. → Read More

Physicians and social media – where there’s no second opinion

A patient can post just about anything they want about a physician. But physician’s may be violating HIPAA if they reply to their patient via social media. → Read More

Ted Koppel’s new book tells a good story but lacks facts

In his new book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel offers a lot of doomsday scenarios, but not enough facts to ensure that this is placed in the non-fiction section. → Read More

Why information security jobs go unfilled

In this 3-part series, I dealt with the issue of a shortage of people in the information security sector. In parts 1 & 2, I addressed why firms struggle to find quality information security staff. In this final segment, I’ll discuss how recruiters can help or hinder that, and get insights from noted information security recruiter Lee Kushner. → Read More

Don’t use general recruiters in salary negotiations

In part 1, I addressed why firms struggle to find quality information security staff. In this segment, I’ll discuss how recruitment can help or hinder that, and get insights from noted information security recruiter Tracy Lenzner. → Read More

The CSA is the new VIP of information security

While a CISO may get the glory; security architects are what most organizations need. → Read More