Skip to content Skip to sidebar Skip to footer

Welcome to Rothstein Publishing!

ernie-hayden-rothstein-publishing

Critical Infrastructure at Risk from Operational Technologies and IOT Vulnerabilities

Critical Infrastructure at Risk from Operational Technologies and IOT Vulnerabilities by Ernie Hayden CISSP GICSP(Gold) PSP In a recent article, Skybox Technology raised concerns resulting in the above headline. Even in a Kaspersky news release, Internet of Things (IoT) cyberattacks have more than doubled during the first half of 2021. Kaspersky also noted that from…

Read More

tony-jaques-rothstein-publishing

Cyber-Crises Are Never “Just an IT Problem”

Cyber-Crises Are Never "Just an IT Problem" by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict. Online data failures and ransomware attacks are emerging as a leading deadly threat to reputation. However, some organisations still seem to…

Read More

building-effective-cybersecurity-program-rothstein-publishing

Free Excerpt: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability

This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability. This chapter will help you to: Understand the relationship between threats and vulnerabilities. Understand how to identify and…

Read More

building-effective-cybersecurity-program-rothstein-publishing

Free Excerpt: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability

This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability. This chapter will help you to: Understand the relationship between cyber threats and vulnerabilities. Understand how to identify…

Read More