Blogs

Showing Blog Posts: 1–10 of 15 by Robert Moskowitz

Robert Moskowitz

New Mobility Partnerships

  • Guidelines for Mobile Computing Security

    by Robert Moskowitz on December 15, 2014

    Mobililty is clearly the future of computing. Smartphones and tablets are more powerful and bring-your-own device is an accepted reality. This raises major security issues, as mobile computing can be readily compromised at the device, network and wireless connectivity levels. The mobile device itself—whether a portable computer, personal digital assistant, laptop, smartphone, tablet computer, or…

  • Latest Guidelines for Malware Detection

    by Robert Moskowitz on November 28, 2014

    Today's malware brings a wide range of threats that—without proper detection and defense—can wreak havoc on any computer system. While various kinds of malware can get onto your system via the original manufacturer, information-seeking government agencies, and covert infiltrators, the vast majority of malware still comes over the Internet as software downloads. Deceptive Downloads Because a…

  • Network Intrusion: NIDS and Detection

    by Robert Moskowitz on November 24, 2014

    Network intrusions—any unauthorized activity on a computer network—utilize network resources that can be better used for other, authorized, purposes. They threaten the security of the network and data. There are a variety of ways to detect an intrusion, including monitoring network logs, sniffing network traffic, and real-time filtering for specific network events. At a minimum, network security…

  • Security Infrastructure: What Does It Really Entail?

    by Robert Moskowitz on October 31, 2014

    For years, the goal behind security infrastructure has been to thwart—or at least, mitigate—malicious attacks against an organization's secure data. But in today's world of interconnected computer systems and new generation of information technology capabilities, this old-style infrastructure is no longer capable of guaranteeing privacy for sensitive data. Modern industry needs requires features…

  • A Whole New Way to Spot Malware Before It Spots You

    by Robert Moskowitz on October 28, 2014

    Enterprise networks still rely on antivirus software and blacklists to keep known malware at arm's length. But researchers suggest another approach, one which promises to spot a dangerous piece of code before it shows up on a list somewhere. This form of detection doesn't look for malicious code, but for malicious networks communicating with that code. Internet service providers, and any…

  • Effective Strategies for Information Protection

    by Robert Moskowitz on October 14, 2014

    The fact that more than one user in different locations may require simultaneous access to the confidential information used in different applications makes it difficult to protect the information from a wide variety of threats. Identifying Threats Protection is more than controlling access. It's also about preventing unauthorized release, unauthorized modification, and unauthorized denial of…

  • Security Infrastructure: Infrastructure Protection

    by Robert Moskowitz on October 2, 2014

    With today's emphasis on information collection, processing, and usage, Nearly every organization today has to collect, process, and use data for its daily activities, strategic planning, and administration. Considering how heavily dependent organizations are on their information infrastructures, protecting that infrastructure is critical. As much as we would like to, the systems cannot just be…

  • Data Privacy in the 21st Century

    by Robert Moskowitz on September 18, 2014

    Privacy impacts both the quality of life and business success. In today's highly automated and digitized world, the concept of "privacy" effectively boils down to data privacy.Simply put, you want to be able to keep certain information from being shared (voluntarily or involuntarily) with others. Although the word "privacy" does not appear in the United States Constitution, the Supreme Court has…

  • Cybercrime and Effective Cyber Law Enforcement

    by Robert Moskowitz on August 19, 2014

    These days, it's rare to open a news source (print or digital) without finding a story about cybercrime. Cybercriminals are hacking into databases, stealing credit and debit card account numbers, compromising individuals' identities, and shutting down legitimate websites. These articles highlight how necessary cyber law enforcement has become.Although data security budgets keep climbing and…

  • A Comprehensive Cloud Strategy for Data Security

    by Robert Moskowitz on August 1, 2014

    As popular as cloud computing has become, and as fast as it continues to grow, it brings with it a whole new set of data security concerns. Without a robust cloud strategy for ensuring security capabilities, cloud computing has little strategic value, particularly since a single data breach can cost an organization far more than it has gained from the advantages of cloud-based data storage. …

This document was retrieved from http://www.rsaconference.com/blogs/by/114/moskowitz on Wed, 17 Dec 2014 21:23:07 -0500.
© 2014 EMC Corporation. All rights reserved.