Blogs

Showing Blog Posts: 21–30 of 34 by Christopher Burgess

  • Cloud Service Maturing in Southeast Asia

    by Christopher Burgess on May 12, 2014

    Cloud service adoption and build-out in Southeast Asia is not new, as evidenced by the rapid pace in which Thailand, Malaysia, and Singapore took key positions in the data center and cloud service provider categories in 2011. Indeed, in 2012, the Singapore government offered incentives to companies to adopt cloud computing, and according to the Singapore Economic Development Board, Singapore was…

  • Greatly Reduce Data Theft by Knowing the Who and Where of Your Data

    by Christopher Burgess on May 9, 2014

    The universal constant of every business, regardless of size or industry, is that it has important data, and that data may be the target for theft. What should be the second constant is knowledge of where the data is located. Once you know its location, you can sort out who has access. This sounds simple, yet so many companies are unable to say with certainty where their data is, who has access…

  • BYOD Is Alive and Growing in APAC

    by Christopher Burgess on May 5, 2014

    Bring your own device (BYOD) adoption in APAC is alive and well, and is expected to increase by more than 20 percent from 2014 to 2020, according to a study by Grand View Research. Two driving factors for this growth are reduced hardware costs and the maturation of cloud-based solutions, and the devices of choice are smartphones and tablets. What's in it for the businesses? A report from…

  • When Intellectual Property Goes Out the Front Door

    by Christopher Burgess on May 1, 2014

    According to a 2012 survey by the Japanese Ministry of Economy, Trade, and Industry (METI) referenced in The Asahi Shimbun, it was revealed that of the 3,000 Japanese companies polled, 13.5 percent have had their intellectual property (IP) leaked or have suspected a leak over the past five years. The Asahi Shimbun goes on to describe how IP is being stolen by a variety of entities, both foreign and…

  • The Security Threat Posed by Social Engineering

    by Christopher Burgess on April 10, 2014

    When one uses the words "security threat" and "social engineering" together, the analogy of hand-in-glove is appropriate. At the RSA Conference 2014, this was adroitly explained in the session "When the Phone Is More Dangerous Than Malware" hosted by Christopher Hadnagy and Michele Fincher, both of Social-Engineer, Inc., as they walked the attendees through how social engineers collect, sort, …

  • CISOs, Business Security, and the Business of Security

    by Christopher Burgess on April 3, 2014

    So you want to be a CISO, really? Business security, or the business of security, has evolved and is evolving, according to Todd Fitzgerald of Grant Thornton International, who shared his thoughts in his RSA Conference 2014 session, "So Why on Earth Would You WANT to Be a CISO?" Fitzgerald captured the challenge facing all who are thinking of moving into the CISO career track when he shared a…

  • Training Bad Habits Out of Users: End User Training

    by Christopher Burgess on April 1, 2014

    User behavior is the magic ingredient which can ensure end user training programs are successful or an ignoble failure. The recent RSA Conference 2014 in San Francisco featured a panel discussion on this topic, "Changing User Behavior: The Science of Awareness" hosted by Frank Dimina, director of federal sales at Check Point Software Technologies. Dimina asked the panelists (Kati Rodzon, an…

  • RFID: Connecting Users and Devices

    by Christopher Burgess on March 13, 2014

    Radio-frequency identification (RFID) chips are permeating our life at every level—at work, at home, and on the go. And while there is a important distinction between RFID and near field communications (NFC) chips, the premise is similar. For example, you may carry a dongle which opens your automobile door when it's within 20 feet of the vehicle. Whereas if you have a credit card from a European…

  • When Security Policies Collide With Business Realities

    by Christopher Burgess on February 4, 2014

    Horror stories abound about the wayward employee who ignored the established information security policies in an effort to get the job done. The employee didn't mean to put the company at risk, but that's exactly what happened. In situations like this, the employee is likely caught in the switches between the information security policies of the company and the goals and expectations of his…

  • Data Leakage: The Human End-Around to DLP

    by Christopher Burgess on January 28, 2014

    The old adages "still water finds its own level" and "moving water finds a path of least resistance" both have applicability when we think of data leakage and employees' engagement with data loss prevention (DLP) processes, policies, procedures, and software. With still water, data is at rest; with moving water, your data in transit. There are also two types of employees: Those who are trying to…

This document was retrieved from http://www.rsaconference.com/blogs/by/100/burgess on Thu, 20 Nov 2014 21:16:06 -0500.
© 2014 EMC Corporation. All rights reserved.