Menu

Blogs

  • Pragmatic Dysfunction

    by Securosis Team on January 19, 2016

    By Rich Mogull, analyst and CEO of Securosis. I believe that nearly all of information security can be summed up by a single line from the venerated film Men in Black: "A person is smart. People are stupid." Recently, on multiple client engagements, I've seen organizations with very smart people open themselves up to security issues due to internal dynamics. It’s not out of willful blindness or due…

  • Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

    by Ben Rothke on January 19, 2016

    Anyone who has spent time in the information security industry knows what while there is good data around; there is a lot to be desired in terms of empirical and measurable information security data. There’s too much marketing hype, combined with firms who often don’t know how to make sense out of their own data. In Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems…

  • Encryption Rules Only Apply to Those Who Follow Them

    by Tony Bradley on January 18, 2016

    The world can be a dangerous place, and nations around the world must be vigilant to identify and prevent attacks from would-be terrorists. In the wake of recent terrorist attacks in Paris and in San Bernardino, Calif., there has been increased debate over the need for intelligence agencies to have some sort of back-door access to enable monitoring of encrypted data and communications. It’s an…

  • Weekend Reading: Microsoft Silverlight and the Internet of Things

    by Jennifer Lawinski on January 15, 2016

    We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the cybersecurity world, chosen by the field's best writers and editors. This week we take a look at Microsoft Silverlight, the Internet of Things and whether security metrics are actually doing you any…

  • Your Security Resolutions for 2016

    by Wendy Nather on January 14, 2016

    We start the New Year with the best of intentions. We're going to join an ISAC and work out every day; consume only healthy and organic data; clean out our overstuffed Hadoop clusters and get rid of that out-of-fashion data; and measure our performance to match our goals. Oh yes, and we're going to stay within the security budget. But making lifestyle changes is hard, especially in security, where …

  • Getting Ready for RSA Conference 2016: The New Discover Pass & More

    by Jennifer Lawinski on January 13, 2016

    Before you know it, we’ll all be in San Francisco for this year’s RSA Conference. For those of you that are still making your travel plans and trying to sort out your schedule, we’d like to highlight a few changes to this year’s event. This year marks the 25 th anniversary of the RSA Conference, and the event will be bigger and better than ever before. We’ve taken your feedback from past events…

  • Women in Tech: Exploring the Benefits of Diversity in Cybersecurity with Niloofar Razi Howe

    by Jennifer Lawinski on January 12, 2016

    RSA’s Chief Strategy Officer Niloofar Razi Howe has spent more than 25 years working in for or investing in technology companies, with a focus in the past decade on the security industry. We sat down with her to talk about her career, what challenges she sees for women in the security industry, and how diversity affects the workplace. You can read the first part of our conversation with Niloofar…

  • The Future of Cybersecurity: A Conversation With Peter W. Singer

    by Jennifer Lawinski on January 11, 2016

    What is going to shape the cybersecurity landscape of the future? According to Peter W. Singer, an author and geopolitical strategist with the New America Foundation, there are many factors at play. He sat down with RSA Conference to talk about robots, encryption, the geopolitical landscape, and more in advance of his keynote, NextWar: The Future of Technology and Geopolitics, at the Innovation…

  • Today’s ‘Unbreakable’ Encryption Is Tomorrow’s Security Weakness

    by Tony Bradley on January 8, 2016

    We hear a lot about encryption as a magic silver bullet solution that will secure and protect our data. Businesses and consumers are directed to employ encryption wherever possible, and in the wake of any data breach one of the first questions that comes up—often from encryption vendors with a marketing agenda—is whether the compromised data was protected with encryption. Encryption evolves over…

  • Security and Innovation: A Conversation with RSA's Niloofar Razi Howe

    by Jennifer Lawinski on January 7, 2016

    Innovation and security go hand-in-hand, and no one knows that better than RSA’s Chief Strategy Officer Niloofar Razi Howe. As the RSA Conference team gets ready for the big event, and the Innovation Sandbox competition, in San Francisco this year, we sat down with Ms. Howe to talk about innovation, security and the unique role startups will play in helping drive the future of the InfoSec…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 30 Apr 2016 11:02:06 -0400.
© 2016 EMC Corporation. All rights reserved.