Blogs

Showing Blog Posts: 11–20 of 32 by Christopher Burgess

  • Incident Response: Is the House Really on Fire?

    by Christopher Burgess on July 16, 2014

    The comparison of incident response teams to fire departments has been around for many years, with well-funded entities within enterprises likened to professional fire departments in a large city and the less-funded teams within small-medium businesses (SMBs) likened to volunteer fire departments found in smaller communities. The difference between the well-funded and volunteer teams can be…

  • Intellectual Property at Risk

    by Christopher Burgess on June 23, 2014

    Walk about your office and ask your employees, "Are you appropriately protecting the company's intellectual property (IP)?" Count how many responses resemble, "Oh, I don't have access to any IP, I work in XYZ department, not R&D." Such answers cause cringes at every level, as it demonstrates multiple points of failure: failure to enlighten the workforce that IP involves so much more than just R&D…

  • BYOD: Security and Privacy

    by Christopher Burgess on June 18, 2014

    If your office has a BYOD (bring your own device) policy, your employees are connecting your ecosystem with their own devices, as are your partners with your intranet—and you may have little knowledge about these devices. The good news is that BYOD security and privacy implementation has a number of defined paths that can help you navigate through this jungle of privacy, security, and legal…

  • Next-Gen Malware: Destructive Devices

    by Christopher Burgess on June 11, 2014

    The word malware (malicious or malevolent software) has permeated our lexicon, especially for those in the security world. A cyber-criminal's intent has been either to utilize your resources in their criminal endeavors (i.e., put their malware on your system and launch from within your hosted spaces) or to extract information from your entity that could be monetized quickly and effectively. At the…

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

  • Losing Faith with Retail POS?

    by Christopher Burgess on May 28, 2014

    The technology section of every newspaper, magazine or online entity lately is describing how point of sale (POS), and the use of your credit cards is a bit like playing Russian roulette with the retail POS terminals — are they or are they not compromised? The recent batch of retail breaches of payment card industry (PCI) data began with Target, then Neiman Marcus, Michaels, and a bevy of…

  • National and International Security Awareness Initiatives

    by Christopher Burgess on May 23, 2014

    Programs such as National Cyber Security Awareness Month (US) and Safer Internet Day (global) are designed to heighten international awareness for both companies and consumers. But who benefits? Individuals? Small and medium businesses (SMBs)? Enterprises? Individual Awareness Over the course of the past five years, National Cyber Security Awareness Month (NCSAM) has evolved from providing…

  • Breaches: When You're Caught With Your Britches Down

    by Christopher Burgess on May 19, 2014

    Head over to the search engine of your choice, put in the keywords "data breach," and take a look at the screen. The very first thing you'll encounter is the new cottage industry that has evolved around rectifying the residual fallout that accompanies many breach events. You'll discover that there is no shortage of paid ads offering various solutions. Then you'll see the multitudes of vendors…

  • Cloud Service Maturing in Southeast Asia

    by Christopher Burgess on May 12, 2014

    Cloud service adoption and build-out in Southeast Asia is not new, as evidenced by the rapid pace in which Thailand, Malaysia, and Singapore took key positions in the data center and cloud service provider categories in 2011. Indeed, in 2012, the Singapore government offered incentives to companies to adopt cloud computing, and according to the Singapore Economic Development Board, Singapore was…

  • Greatly Reduce Data Theft by Knowing the Who and Where of Your Data

    by Christopher Burgess on May 9, 2014

    The universal constant of every business, regardless of size or industry, is that it has important data, and that data may be the target for theft. What should be the second constant is knowledge of where the data is located. Once you know its location, you can sort out who has access. This sounds simple, yet so many companies are unable to say with certainty where their data is, who has access…

This document was retrieved from http://www.rsaconference.com/blogs/by/100/burgess on Fri, 24 Oct 2014 03:43:40 -0400.
© 2014 EMC Corporation. All rights reserved.