Menu

Blogs

  • Hugh Thompson Show Closes Out RSAC 2015

    by Fahmida Y. Rashid on April 24, 2015

    Leading image

    Dr. Hugh Thompson, the program committee chairman of RSA Conference, closed out the RSA Conference week with the amusing and informational “Hugh Thompson and Guests.” How many of us will ever be able to look at a horse and carriage again without remembering his retelling of his family's runaway carriage ride? All the laughter and jokes aside, Thompson addressed an area of conversation which typically does not come up in information security circles. Thompson and his guests explored the human…

  • Everyone has a role to play in securing Asia’s digital future

    by Linda Gray on May 1, 2015

    Asia is in the middle of a digital revolution, with a booming market for consumer electronics and a fast-growing startup scene. The explosive growth makes organizations in the Asia-Pacific region especially attractive to criminals and hackers. They are playing a game of cat-and-mouse, with defenders trying to secure information within the enterprise and attackers trying to access it unlawfully. …

  • Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

    by Ben Rothke on April 29, 2015

    All encryption (with the exception of a one-time pad) can be broken. Bruce Schneier likes to use the analogy of a pole in the ground for encryption. You can try to break the pole (encryption); or simply go around the pole. Rather than finding problems with a proven encryption algorithm, attackers will try to go around it via how it’s implemented, and other similar attacks. In Phishing Dark Waters:…

  • Is Defense in Depth Dead? Part 2: The Lesson of Babylon

    by Danelle Au on April 28, 2015

    A few weeks ago, when I asked, Is Defense in Depth Dead? I used the example of Dover Castle to illustrate the point that, as weapons and warfare change, defensive strategies must also evolve to meet new realities. Dover Castle and other fortresses offered their occupants centuries of effective protection—until the advent of gunpowder and cannon on the battlefields of medieval Europe. Which is not…

  • Congress is Moving Forward With Information Sharing, Will it Work?

    by Tony Kontzer on April 27, 2015

    Boosted by the U.S. House of Representatives considering — and ultimately passing — two separate cyber threat information-sharing bills last week, information sharing was top of mind for many attendees at RSA Conference last week. Having waited patiently for years as Washington debated the particulars of a complex issue, RSAC speakers had a lot of feelings about what information sharing means to…

  • Stop the Insanity! My First Year as a PCI QSA

    by Rook Security on April 27, 2015

    I’ve been involved with PCI-DSS in some way, shape, or form over the past eight years. For most of this time, I worked for corporations that needed to achieve or maintain PCI DSS compliance. A little over a year ago, I received Qualified Security Assessor (QSA) training and became a full-fledged QSA. It’s quite different being on the other side of the fence. I also understand my clients’…

  • Protecting Children From Online Predators

    by Tony Kontzer on April 24, 2015

    Something totally unexpected happened to me at the RSA Conference in San Francisco Thursday: For the first time in my decades-long career, I cried at a technology event. And something tells me I wasn't the only one. RSAC attendees listened to Alicia Kozakiewicz tell, in amazing detail, of her nightmarish abduction by an Internet predator during the "In to the Woods" keynote panel. On New Year's Day, …

  • Panel Weighs in on Future of Authentication

    by RSAC Contributor on April 24, 2015

    If you look around during RSA Conference, you will notice there are a number of parallel events going on around Moscone Center. IOActive put together a few talks on Tuesday and Wednesday as part of their IOasis event. In the same vein, Nok Nok Labs hosted a panel discussion on the future of authentication on Thursday. This post comes courtesy of Girish Wadhwani, of Nok Nok Labs. The panel was…

  • The Future of Security Lies in Teaching Our Kids to Hack

    by Tony Kontzer on April 24, 2015

    You may have noticed that one of the themes of this year's RSA Conference is kids. They've been an overlooked part of technology industry events for too long, and this year RSAC is doing something about it. Two keynotes focused on making the Internet safer for kids. And a big chunk of the second floor concourse at Moscone West was made over into an interactive Cyber Village exhibit designed to…

  • RSAC 2015 Daily Recap: Thursday

    by Fahmida Y. Rashid on April 23, 2015

    RSA Conference goes the full week, with the closing keynote on Friday, but for many people, today is the de facto last day. While there are plenty of sessions on tap for Friday morning, the expo hall closed this afternoon. Many of the attendees, as well as members of the press, head home Thursday. If things went well, they would have a lot of ideas brimming in their heads about things they…

  • RSAC 2015 Experts on Responding to a Cyber Crisis

    by Tony Kontzer on April 23, 2015

    Security professionals are at war, a panel of corporate security executives said at the RSA Conference in San Francisco Thursday. Granted, the man leading the discussion was Mike McConnell, who, as former U.S. director of national intelligence, can be excused for using war analogies. The discussion was littered with battle references that made it clear military-style thinking is prevalent when…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 05 May 2015 04:12:46 -0400.
© 2015 EMC Corporation. All rights reserved.