Menu

Blogs

  • An Anthem to Get Behind: Enable Two-Factor Authentication

    by Eric Cowperthwaite on February 17, 2015

    In the security industry, we all know it’s just a matter of time, sometimes minutes, before the next breach makes headlines. We’re stopping and blocking attacks left and right, and it only takes that one time for a hacker to be right, that one mistake before we have to answer the question, “What happened?” The latest victim was Anthem, a huge health insurance provider who had 80 million customer…

  • Catching Up With Innovation Sandbox Winners: Remotium

    by Fahmida Y. Rashid on February 16, 2015

    For 10 years, RSA Conference has highlighted companies with innovation information security products as part of its Innovation Sandbox Contest. Who will we see this year? Every year, 10 companies go head-to-head on the Innovation Sandbox stage at RSA Conference to nab the "Most Innovative Company at RSA Conference" title. Teams from each company present and demonstrate their product in front of a…

  • The Seeds of Security

    by Wendy Nather on February 12, 2015

    My colleague Garrett Bekker once described the security industry as a pomegranate. It is brilliantly accurate: from the outside it looks like one piece, but when you open up the fruit, you see hundreds of little seeds, and it all makes a big mess (and leaves stains on everything you touch). Is the industry really this bad? Yes, it is. Consider that in our 451 Research master list, we have over…

  • Catching Up with Tamer El Refaey

    by Fahmida Y. Rashid on February 11, 2015

    Tamer El Refaey, the director of security monitoring and operations at Emirates Integrated Telecommunications spoke at RSA Conference APJ 2014 in Singapore. In this Q&A he talks about what excites him about information security and how he got to where he is today. RSA Conference: Can you provide some background on how you got into the security industry and how you ended up where you are today? El…

  • The Hacker as an Administrator

    by Marc Maiffret on February 10, 2015

    In many data breaches, your IT team or someone else with the right privileges has been co-opted. By the time an attacker is lifting data from your servers, they are no longer hacking but simply using stolen user credentials and passwords. And in many of those instances, the way they are moving through your environment is not via any custom tools, but by taking advantage of administrative features…

  • Catching Up With Innovation Sandbox Winners: Appthority

    by Fahmida Y. Rashid on February 9, 2015

    For 10 years, RSA Conference has highlighted companies with innovation information security products as part of its Innovation Sandbox Contest. Who will we see this year? Every year, 10 companies go head-to-head on the Innovation Sandbox stage at RSA Conference to nab the "Most Innovative Company at RSA Conference" title. Teams from each company present and demonstrate their product in front of a…

  • We Welcome Our New Automation Overlords

    by Securosis Team on February 5, 2015

    This post is by Rich Mogull, analyst and CEO of Securosis, an independent security research firm. I am inherently lazy. If I can come up with some new, automated way to solve a problem and save some time, I'll spend many hours more than it would take to knock it out manually on the off chance of some future time savings. But I understand I'm a bit unusual that way (and it is sometimes to my…

  • Catching Up With Innovation Sandbox Winners: Invincea

    by Fahmida Y. Rashid on February 5, 2015

    RSA Conference is looking for companies innovating in information security. Is that you? Every year, RSA Conference showcases 10 companies with innovative information security products as part of its Innovation Sandbox Contest. RSA Conference 2015 marks the tenth year of the competition, and to mark that milestone, we asked past winners how they've fared over the past few years. During Innovation…

  • Working With Government: Information Sharing Laws

    by Todd Inskeep on February 4, 2015

    This is the second post in a multi-part series. The first post is here. Information sharing is one major aspect of the current calls for action on National Cyber Security issues. As I noted earlier, lawers, company executives, government officials and others have differing views on the need for new laws regarding information sharing. Information sharing has been discussed in the context of the…

  • Changing the Security Conversation One Topic at a Time

    by Fahmida Y. Rashid on February 3, 2015

    Just two months into 2015, and there is already a theme in information security: let's talk. Let's talk within the organization, within the industry, with the government, with everyone else. It's not a new concept. The hallmark of a good security professional is one who can communicate effectively with end users, business stakeholders, and the board of directors. Information security…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 28 May 2015 18:11:56 -0400.
© 2015 EMC Corporation. All rights reserved.