Blogs

  • As Companies Get Social, Network Security Grows

    by David Wallace on April 8, 2014

    "As long as it happens to someone else" is a key part of data protection and network security. Deter the bad guys long enough and they'll go looking for a weaker target. Social and personal connections can help immensely with daily work but make for scary nightmares. The IT department can "MacGyver" systems to guard against technical leaks or intrusion, but then they have to hope that humans…

  • Manufacturing: The Frequently Forgotten Part of Critical Infrastructure

    by Gib Sorebo on April 7, 2014

    With all the different sectors listed as critical by the Department of Homeland Security, it’s easy to understand how some fail to get the attention they deserve. After all, losing power, water, or medical care may seem a lot more serious than not getting the latest tablet or smart phone. However, our economic sectors do not operate in isolation. Instead, they are an intricate set of dependencies…

  • CISOs, Business Security, and the Business of Security

    by Christopher Burgess on April 3, 2014

    So you want to be a CISO, really? Business security, or the business of security, has evolved and is evolving, according to Todd Fitzgerald of Grant Thornton International, who shared his thoughts in his RSA Conference 2014 session, "So Why on Earth Would You WANT to Be a CISO?" Fitzgerald captured the challenge facing all who are thinking of moving into the CISO career track when he shared a…

  • How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    by Ben Rothke on April 2, 2014

    When it comes to documenting the history of cryptography, David Kahn is singularly one of the finest, if not the finest writers in that domain. For anyone with an interest in the topic, Kahn’s works are read in detail and anticipated. Kahn’s first book was written almost 50 years ago: The Codebreakers – The Story of Secret Writing; which was a comprehensive overview on the history of…

  • Training Bad Habits Out of Users: End User Training

    by Christopher Burgess on April 1, 2014

    User behavior is the magic ingredient which can ensure end user training programs are successful or an ignoble failure. The recent RSA Conference 2014 in San Francisco featured a panel discussion on this topic, "Changing User Behavior: The Science of Awareness" hosted by Frank Dimina, director of federal sales at Check Point Software Technologies. Dimina asked the panelists (Kati Rodzon, an…

  • Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency

    by Ben Rothke on March 31, 2014

    Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency is definitely not your typical information security title. Mix in a few parts reference, technical guide, rant, scary stories, comedy and myriad references to movies, and there you have this book. The full title of the book is actually Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true?…

  • The Oil and Gas Industry: A Surge in Cybersecurity Vigilance?

    by Gib Sorebo on March 31, 2014

    Last week I chaired a cybersecurity summit in Houston, Texas, one of many cybersecurity conferences focused on this sector. While the American Petroleum Institute (API) has sponsored such conferences for nearly a decade, the proliferation of these conferences along with the resurrection of an Information Sharing and Analysis Center (ISAC) for the oil and gas industry is a reflection of greater…

  • How Metrics Dictate Survival of Security's Fittest

    by Katrina Rodzon on March 27, 2014

    Setting up and maintaining a security awareness program is almost identical to doing a research study. You start with a question or behavior, you create your study/manipulation, and you measure the results. Sometimes the results lead to the end of the experiment, many other times it leads to small or large manipulations and further experimentation. The same is true when setting up a security…

  • Secure Global Open Source Calling and Message Tools

    by David Wallace on March 25, 2014

    Risk versus reward? Open source versus packaged? Security or flexibility? All of these decisions matter deeply when considering personal safety for international travelers. Because today's cell phones send a signal beacon that identifies your location, network, and movement, companies are turning to more secure open source applications to protect phone conversations and hide the email trail in…

  • Security Assessment From the Outside-In

    by David Wallace on March 20, 2014

    Outside-In security starts with realizing that your company or organization doesn't have all the answers. The Internet is a big place, and the World Wide Web is just one part of it. Connected mobile devices and appliances are expanding their reach every day, and with it, the complexity of a security assessment. Importance of Security Assessments Your people rely on personal devices and…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 27 Aug 2014 21:02:44 -0400.
© 2014 EMC Corporation. All rights reserved.