Blogs

Showing Blog Posts: 21–30 of 35 by Christopher Burgess

  • Breaches: When You're Caught With Your Britches Down

    by Christopher Burgess on May 19, 2014

    Head over to the search engine of your choice, put in the keywords "data breach," and take a look at the screen. The very first thing you'll encounter is the new cottage industry that has evolved around rectifying the residual fallout that accompanies many breach events. You'll discover that there is no shortage of paid ads offering various solutions. Then you'll see the multitudes of vendors…

  • Cloud Service Maturing in Southeast Asia

    by Christopher Burgess on May 12, 2014

    Cloud service adoption and build-out in Southeast Asia is not new, as evidenced by the rapid pace in which Thailand, Malaysia, and Singapore took key positions in the data center and cloud service provider categories in 2011. Indeed, in 2012, the Singapore government offered incentives to companies to adopt cloud computing, and according to the Singapore Economic Development Board, Singapore was…

  • Greatly Reduce Data Theft by Knowing the Who and Where of Your Data

    by Christopher Burgess on May 9, 2014

    The universal constant of every business, regardless of size or industry, is that it has important data, and that data may be the target for theft. What should be the second constant is knowledge of where the data is located. Once you know its location, you can sort out who has access. This sounds simple, yet so many companies are unable to say with certainty where their data is, who has access…

  • BYOD Is Alive and Growing in APAC

    by Christopher Burgess on May 5, 2014

    Bring your own device (BYOD) adoption in APAC is alive and well, and is expected to increase by more than 20 percent from 2014 to 2020, according to a study by Grand View Research. Two driving factors for this growth are reduced hardware costs and the maturation of cloud-based solutions, and the devices of choice are smartphones and tablets. What's in it for the businesses? A report from…

  • When Intellectual Property Goes Out the Front Door

    by Christopher Burgess on May 1, 2014

    According to a 2012 survey by the Japanese Ministry of Economy, Trade, and Industry (METI) referenced in The Asahi Shimbun, it was revealed that of the 3,000 Japanese companies polled, 13.5 percent have had their intellectual property (IP) leaked or have suspected a leak over the past five years. The Asahi Shimbun goes on to describe how IP is being stolen by a variety of entities, both foreign and…

  • The Security Threat Posed by Social Engineering

    by Christopher Burgess on April 10, 2014

    When one uses the words "security threat" and "social engineering" together, the analogy of hand-in-glove is appropriate. At the RSA Conference 2014, this was adroitly explained in the session "When the Phone Is More Dangerous Than Malware" hosted by Christopher Hadnagy and Michele Fincher, both of Social-Engineer, Inc., as they walked the attendees through how social engineers collect, sort, …

  • CISOs, Business Security, and the Business of Security

    by Christopher Burgess on April 3, 2014

    So you want to be a CISO, really? Business security, or the business of security, has evolved and is evolving, according to Todd Fitzgerald of Grant Thornton International, who shared his thoughts in his RSA Conference 2014 session, "So Why on Earth Would You WANT to Be a CISO?" Fitzgerald captured the challenge facing all who are thinking of moving into the CISO career track when he shared a…

  • Training Bad Habits Out of Users: End User Training

    by Christopher Burgess on April 1, 2014

    User behavior is the magic ingredient which can ensure end user training programs are successful or an ignoble failure. The recent RSA Conference 2014 in San Francisco featured a panel discussion on this topic, "Changing User Behavior: The Science of Awareness" hosted by Frank Dimina, director of federal sales at Check Point Software Technologies. Dimina asked the panelists (Kati Rodzon, an…

  • RFID: Connecting Users and Devices

    by Christopher Burgess on March 13, 2014

    Radio-frequency identification (RFID) chips are permeating our life at every level—at work, at home, and on the go. And while there is a important distinction between RFID and near field communications (NFC) chips, the premise is similar. For example, you may carry a dongle which opens your automobile door when it's within 20 feet of the vehicle. Whereas if you have a credit card from a European…

  • When Security Policies Collide With Business Realities

    by Christopher Burgess on February 4, 2014

    Horror stories abound about the wayward employee who ignored the established information security policies in an effort to get the job done. The employee didn't mean to put the company at risk, but that's exactly what happened. In situations like this, the employee is likely caught in the switches between the information security policies of the company and the goals and expectations of his…

This document was retrieved from http://www.rsaconference.com/blogs/by/100/burgess on Tue, 25 Nov 2014 15:41:36 -0500.
© 2014 EMC Corporation. All rights reserved.