Menu

Blogs

  • My First RSA Conference: Exciting Professional Diversity and a Pinch of Fear

    by Rita S. Heims on February 26, 2015

    Leading image

    My good friend Jon Stanley invited me to speak on his panel at RSAC 2015. This will be my first time at the conference, let alone as a speaker. Over the past two decades as a lawyer and law professor, I’ve been to plenty of conferences: grand ones organized by professional membership associations with fancy keynotes speakers and high production value; little academic ones where only the twenty people in attendance know about (or care about) the subject. They all have something in common: They are…

  • RSA Conference Proudly Expands Into Abu Dhabi!

    by Linda Gray on February 25, 2015

    With RSA Conference 2015 just around the corner in San Francisco, we are hearing a lot of excitement and feedback from our community regarding new session formats such as the crowdsourced track and our revamped Sandbox with various experiential learning opportunities. However, if you thought we were focusing only on US content, you’re wrong! After seeing a record number of attendees at last year's…

  • Quick Chat With Skycure's Adi Sharabani

    by Fahmida Y. Rashid on February 24, 2015

    Adi Sharabani, CEO and co-founder of mobile security company Skycure, spoke about threats on mobile devices at RSA Conference APJ 2014 in Singapore. In this Q&A he talks about what excites him about information security and how he got to where he is today. RSA Conference: Can you provide some background on how you got into the security industry and how you ended up where you are today? Sharabani: As…

  • Catching Up With Innovation Sandbox Winners: RedOwl Analytics

    by Fahmida Y. Rashid on February 23, 2015

    For 10 years RSA Conference has highlighted companies with innovative information security products as part of its Innovation Sandbox Contest. Who will we see competing this year? Ten companies go head-to-head on the Innovation Sandbox stage at RSA Conference to nab the "Most Innovative Company at RSA Conference" title. Teams from each company present and demonstrate their product in front of a…

  • Working With Government: Privacy

    by Todd Inskeep on February 20, 2015

    This is the fourth post in a multi-part series about how the information security community needs to engage with the government to shape laws which will affect the industry. You can see the first, second, and third posts here. The President’s State of the Union addressed the need for increased cybersecurity investment, new laws, and even the issue of privacy for ourselves and our children. Since…

  • Working With Government: Legal Authority and Law

    by Todd Inskeep on February 18, 2015

    This is the third post in a multi-part series. You can read the first and second parts here. A second major aspect of the current National Cyber Security call for action considers the legal authority to investigate and prosecute cyber-crimes. We also need to agree what would be the appropriate role for law enforcement authorities. There are differing views on whether the Computer Fraud and Abuse Act…

  • An Anthem to Get Behind: Enable Two-Factor Authentication

    by Eric Cowperthwaite on February 17, 2015

    In the security industry, we all know it’s just a matter of time, sometimes minutes, before the next breach makes headlines. We’re stopping and blocking attacks left and right, and it only takes that one time for a hacker to be right, that one mistake before we have to answer the question, “What happened?” The latest victim was Anthem, a huge health insurance provider who had 80 million customer…

  • Catching Up With Innovation Sandbox Winners: Remotium

    by Fahmida Y. Rashid on February 16, 2015

    For 10 years, RSA Conference has highlighted companies with innovation information security products as part of its Innovation Sandbox Contest. Who will we see this year? Every year, 10 companies go head-to-head on the Innovation Sandbox stage at RSA Conference to nab the "Most Innovative Company at RSA Conference" title. Teams from each company present and demonstrate their product in front of a…

  • The Seeds of Security

    by Wendy Nather on February 12, 2015

    My colleague Garrett Bekker once described the security industry as a pomegranate. It is brilliantly accurate: from the outside it looks like one piece, but when you open up the fruit, you see hundreds of little seeds, and it all makes a big mess (and leaves stains on everything you touch). Is the industry really this bad? Yes, it is. Consider that in our 451 Research master list, we have over…

  • Catching Up with Tamer El Refaey

    by Fahmida Y. Rashid on February 11, 2015

    Tamer El Refaey, the director of security monitoring and operations at Emirates Integrated Telecommunications spoke at RSA Conference APJ 2014 in Singapore. In this Q&A he talks about what excites him about information security and how he got to where he is today. RSA Conference: Can you provide some background on how you got into the security industry and how you ended up where you are today? El…

  • The Hacker as an Administrator

    by Marc Maiffret on February 10, 2015

    In many data breaches, your IT team or someone else with the right privileges has been co-opted. By the time an attacker is lifting data from your servers, they are no longer hacking but simply using stolen user credentials and passwords. And in many of those instances, the way they are moving through your environment is not via any custom tools, but by taking advantage of administrative features…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 01 Mar 2015 03:21:43 -0500.
© 2015 EMC Corporation. All rights reserved.