• INAMOIBW and Other Trends from the 2016 RSA Conference Submission Review Process

    by Britta Glade on November 24, 2015

    Leading image

    In the coming weeks, the full RSA Conference agenda will be published (some great "early acceptance" sessions are already online), and it represents a carefully curated selection by the RSA Conference Program Committee of great speakers, critical topics, and interesting viewpoints. The curation process is very deliberate with industry experts reviewing each and every submission, debating the options, and developing compelling tracks. In the course of this review process, we are able to…

  • Cyberattacks on Industry in the Middle East

    by RSAC Contributor on November 24, 2015

    This post comes from Joe Shenouda, CYBERPOL / ECIPS Liaison Officer. He reflects on the cybersecurity space in the Middle East. The Middle East critical infrastructure market is huge and at risk. It will hit 12 billion Euro in revenue by 2018, and it is the victim of a rising and ongoing aggressive cyberwar that barely makes the news. The Middle East's oil industry is huge and has 80 percent of…

  • The Power of Immutable

    by Securosis Team on November 9, 2015

    If you've been following any of my work for the past couple years, you know I've become a huge advocate of cloud computing and DevOps. Not because I've been caught up in any sort of hype machine, but because I've been spending the past five years or so working with them hands-on and helping organizations as they transition to cloud. The deeper I delved into cloud the more I started to adopt…

  • Impressions of RSA Conference 2015 Abu Dhabi: Day 1

    by RSAC Contributor on November 5, 2015

    RSA Conference goes to the Middle East for the first time with RSA Conference 2015 Abu Dhabi. Shafik Ur Rehman, cyber-lead technologist at Booz Allen Hamilton, provided the following report. This morning, when I was getting ready for the RSA Conference 2015, I was thinking less of the Conference but more about few pending tasks at office and how I could complete them during the day at the…

  • RSA Conference 2015 Abu Dhabi: Highlights from Day Two

    by Linda Gray on November 5, 2015

    The former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States, Richard Clarke, delivered a powerful keynote at the closing session of the event today. He shared insights on the state of cybersecurity in the Middle East and what businesses and governments need to do, to prevent high-profile breaches. As an internationally recognized expert on…

  • RSA Conference 2015 Abu Dhabi: Highlights From Day One

    by Linda Gray on November 4, 2015

    The halls are jam packed on day one of RSA Conference 2015 Abu Dhabi! It’s a busy expo floor, with plenty of opportunities to learn, meet with vendors and network with peers from around the region. The Vendor Showcase area seems to be a big hit, as show attendees walked around the floor, listening to vendor representatives demonstrate their solutions. It was also nice to see the RSAC CyberSafety:…

  • The Network Security Test Lab: A Step-by-Step Guide

    by Ben Rothke on November 4, 2015

    It wasn’t that long ago that building a full network security test lab was a highly expensive endeavor. In The Network Security Test Lab: A Step-by-Step Guide (Wiley 978-1118987056) author Michael Gregg has written a helpful hands-on guide to provide the reader with an economical method to do that. The book is a step-by-step guide on how to create a security network lab, and how to use some of the…

  • Securing Today’s Online Kids, A Recap

    by Lance Spitzner on November 3, 2015

    As part of National Cyber Security Awareness Month (also known as #CyberAware) last month, we hosted the webcast Securing Today’s Online Kids. Here, I follow up with a summary of the key points covered during the webcast and answer some of the questions from the event. First and foremost, technology is not something to fear. Technology is an amazing tool that enables our kids to learn, share and…

  • State of Cybercrime in the Middle East

    by RSAC Contributor on November 2, 2015

    This post comes from Joe Shenouda, CYBERPOL / ECIPS Liaison Officer, on the eve of the RSA Conference 2015 Abu Dhabi. The Middle Eastern cyber security market is around $35 billion at the moment. The cost worldwide of cybercrime is estimated at more than $113 billion per year... It is clear that something needs to be done against the second most common economic crime in the Middle east. Cyber…

  • Type Safety, Containers, and What Immutability Does For Operational Security

    by Chenxi Wang on October 30, 2015

    In programming language, there is a concept called Type Safety. Type safety means a set of rules that the language enforces to prevent type errors that a programmer may make, which may lead to unintended or unsafe access to memory. C and C++ are not type-safe languages as the programmer has an incredibly amount of latitude to mix up values and data types. Because of weak type rules, memory attacks…

  • The Case for Researcher Self-Regulation

    by Wendy Nather on October 29, 2015

    We're all familiar with the attacker versus defender dynamic, and how it plays out culturally in the security industry -- just say the word "cyber" and see who winces, for example. But it all used to stay "in the family," where red and blue team activities were confined to security professionals, either within security vendor companies or within organizations that had their own security staff. …

This document was retrieved from on Wed, 25 Nov 2015 18:42:30 -0500.
© 2015 EMC Corporation. All rights reserved.