Blogs

  • The Industrial Defender Acquisition: A Merging of National Security with Critical Infrastructure?

    by Gib Sorebo on March 17, 2014

    This last week, Industrial Defender announced that it had been acquired by Lockheed Martin for an unspecified amount. Brian Ahern and his team are to be congratulated on this apparently successful exit that they had been working towards for the last 12 years. Industrial Defender has long been the largest of the cybersecurity firms specializing in industrial control systems. It is a very fractured…

  • RFID: Connecting Users and Devices

    by Christopher Burgess on March 13, 2014

    Radio-frequency identification (RFID) chips are permeating our life at every level—at work, at home, and on the go. And while there is a important distinction between RFID and near field communications (NFC) chips, the premise is similar. For example, you may carry a dongle which opens your automobile door when it's within 20 feet of the vehicle. Whereas if you have a credit card from a European…

  • Threat Modeling: Designing for Security

    by Ben Rothke on March 3, 2014

    When it comes to measuring and communicating threats, the most ineffective example in recent memory was the Homeland Security Advisory System; which was a color-coded terrorism threat advisory scale. The system was rushed into use and its output of colors was not clear. What was the difference between levels such as high, guarded and elevated? From a threat perspective, which color was more severe -…

  • RSA Conference Day 5 Recap: THANK YOU

    by Alex Bender on February 28, 2014

    Thank you for another exciting RSA Conference! It is hard to believe that a full week has passed us by. Our 23 rd annual event was by far our most successful and we can’t thank you, our community enough for your dedication and involvement. This year a record number of more than 28, 500 attendees experienced approximately 419 sessions, keynotes, peer-to-peer sessions, track sessions, tutorials and…

  • The Best New Books from RSA Conference 2014

    by Ben Rothke on February 27, 2014

    There are a plethora of new books at the RSA conference book store. Here is my pick of the best of them, which I will be reading over the course of the next few months: Threat Modeling: Designing for Security - Adam Shostack Data-Driven Security: Analysis, Visualization and Dashboards - Jay Jacobs and Bob Rudis How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code -…

  • Official RSA Conference 2014 Playlist

    by Ally Lorentson Dunn on February 27, 2014

    Wondering where you can find a list of the awesome songs you've been hearing at RSA Conference this week? Look no further! We've compiled a Spotify playlist of the songs you've heard in the Viewing Point and the Esplanade Ballroom. There's a little something for everyone - a handful of classics, the latest pop hits, and the hippest indie tracks. If you're like me and need a little boost to get you…

  • RSA Conference Day 4 Recap

    by Alex Bender on February 27, 2014

    Despite having very long days and trying to absorb hours upon hours of information, I continue to be amazed by the energy and excitement our attendees bring to Moscone each day. You have treated each day as if we were kicking off a brand new conference – and we appreciate it! The expo floors have been electric and the topics I keep hearing from our attendees involve the value and importance of…

  • New Legislation Addresses Mobile App Privacy in California

    by Stephen Wu on February 27, 2014

    The healthcare field is beginning to hop onto the bandwagon of mobile computing. Mobile computing is spreading to healthcare in a number of ways. The first use case is in diagnostics, in which a doctor or nurse could use a device to monitor health metrics, such as vital signs (whether at hospital stays or simply during a routine check-up), glucose levels for diabetics, sleep data, caloric or…

  • RSA Conference Day 3 Recap

    by Alex Bender on February 26, 2014

    Can you believe we’re mid-week already? Crazy how fast a week can go by when you’re having fun! I am completely energized by you – our attendees – each day I have seen you sharing and learning to better secure our world. More than anything else, this type of communication is what makes RSA Conference such a unique experience. After attending the RSAC speaker's cocktail reception on Tuesday night…

  • You shared WHAT?! Employee File Sharing Risks and Strategies

    by Dave Butcher on February 25, 2014

    In year’s gone by, the majority of ad hoc file exchanges happened over email. But as file sizes continue to grow, email administrators are responding by imposing attachment size limitations on senders, recipients, or both. As a result, many employees are turning to cloud-based file-sharing tools to remain productive and share data ranging from presentations and medical images to loan…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 22 Aug 2014 21:34:39 -0400.
© 2014 EMC Corporation. All rights reserved.