
Ben Rothke
Contributor
Ben Rothke, CISSP, CISM, CISA is a senior information security specialist at Tapad and has over 16 years of industry experience in information systems security and privacy.
His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design and implementation of systems security, encryption, cryptography and security policy development.
Ben is the author of Computer Security - 20 Things Every Employee Should Know (McGraw-Hill). He writes security and privacy book reviews for Slashdot and Security Management and is a former columnist for Information Security, Unix Review and Solutions Integrator magazines.
He is a frequent speaker at industry conferences, such as RSA and MISTI, holds numerous industry certifications and is a member of ASIS, Society of Payment Security Professionals and InfraGard.
He holds the following certifications: CISM, CISA, CGEIT, CRISC, CISM, CISSP, SMSP, PCI QSA.
The opinions expressed in this blog are those of Ben Rothke and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Introducing the Cybersecurity Canon
Last month David Bisson wrote a blog post 10 Must-Read Books for Information Security Professionals, where he asked information security professionals their must-read book. There’s a number of books listed there that are definitely...

To pay, or not to pay, that is the ransomware question
The FBI says don’t pay. Should you heed their advice?

My obligatory 2017 predictions
Tis the information security season to make predictions about what security year 2017 will bring.

Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy
Had Presidential candidate Hillary Clinton employed basic email security techniques, she’d be President-elect.

Who is the information security preferred candidate? A look at presidential election 2016
Trump or Clinton. Which of the 2 leading candidates is best from an information security perspective? Should a CISO prefer one over the other?

Cyber self-defense for kids (and parents too)
Today is the last day of national cyber security awareness month, but not too late for Ben Rothke, CISSP, QSA, Senior Security Consultant, Herjavec Group to provide some tips for parents and children.
A tale of two PCI attestation documents
Is your PCI service provider willing to easily share their AoC? That’s a good sign.

PCI DSS – it takes a village
David Mundhenk and Ben Rothke show how the PCI Security Standards Council really wants PCI to succeed. Much to the chagrin of The National Retail Federation.

The National Retail Federation is dead wrong about PCI
Ben Rothke and David Mundhenk question why the National Retail Federation (NRF) is trying to lawyer-up on PCI.
Message in a PCI bottle - preserving message queue integrity
Final part in the series on achieving PCI compliance when dealing with message queues.

The secrets of Israeli information security innovation
In my previous piece I provided some insights on how Israel has become an information security innovation powerhouse. In closing the topic, I’ll share some insights from Gadi Tirosh who is a managing partner at Jerusalem Venture...

Israel government spurs innovation
See how Israel has become a leading player in the worldwide information security sector.

Without information security processes, you are flying blind
When done well, the creation of an information security process catalog can provide significant benefits for an enterprise.
Practical tips to ensure PCI DSS compliance when dealing with message queues
In this final piece, I will continue with some more detailed items on how to ensure PCI message queue compliance.

A guide to the RSA 2016 conference
Going to RSA 2016? Failing to plan is planning to fail.
How to ensure PCI DSS compliance when dealing with message queues
To queue or not to queue, that is the PCI question – part 2 by Ben Rothke

CyberTech – The Golden Globes of information security
Here’s some of the most interesting firms I met with while at the CyberTech conference.
To queue or not to queue, that is the PCI question
In the first of this three-part series, I will detail issues surrounding message queuing and how to ensure it doesn’t break your PCI DSS compliance effort.

Live from Tel Aviv, it’s CyberTech
I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account.