Menu

Blogs

  • Is Defense In Depth Dead?

    by Danelle Au on March 12, 2015

    When Great Britain’s Royal Engineer, Maurice built Dover Castle in the late 1100s, he focused not just on the grandeur but on the security of its architecture. In Medieval times, castles were the backbone of power, meaning that it had to withstand assaults from enemies. When building Dover Castle, Maurice The Engineer, who served King Henry II, designed a castle with multiple layers of defense…

  • Keeping Kids Safe Online: RU Ready?

    by Fahmida Y. Rashid on March 11, 2015

    It takes a village to take care of, and protect, children. This year, RSA Conference is thinking of the kids. The Internet offers a tremendous wealth of education opportunities, entertainment options, and communication tools for our kids. Unfortunately, the Internet also exposes kids to various dangers, including cyber-bullying, online predators, and identity theft. Children need to learn how to…

  • Prepare Yourself with Incident Response Tabletop Sessions

    by Matthew Pascucci on March 10, 2015

    It's inevitable: Sooner or later, you will experience a security breach. Whether the news makes the front pages of a national media publication or kept within the walls of your company doesn't matter—you'll still feel the repercussions. So how can you prepare? Conduct an incident response (IR) tabletop exercise with all the groups responsible for their part of the incident response plan. Many…

  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

    by Ben Rothke on March 9, 2015

    In Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, author Bruce Schneier could have justifiably written an angry diatribe full of vitriol against President Obama, his administration, and the NSA for their wholesale spying on innocent Americans and violations of myriad laws and the Constitution. Instead, he has written a thoroughly convincing and brilliant book…

  • Working With Government: Security Standards

    by Todd Inskeep on March 5, 2015

    This is the fifth post in a multi-part series following the President’s State of the Union speech back in January. The series examines how the information security community needs to engage with the government to shape laws which will affect the industry. You can see the first, second, third, and fourth posts. Let's take a look at prescriptive requirements. There has been little discussion of…

  • Catching Up With Cyphort's Marion Marschalek

    by Fahmida Y. Rashid on March 4, 2015

    Marion Marschalek, a threat researcher with Cyphort, spoke at both RSA Conference 2014 in San Francisco and RSA Conference APJ 2014 in Singapore. In this Q&A she talks about what excites her about information security and how she got to where she is today. RSA Conference: Can you provide some background on how you got into the security industry and how you ended up where you are today? Marschalek:…

  • Security Awareness Training: We're Doing it Wrong!

    by Rook Security on March 3, 2015

    This post comes from Arlie Hartman, a senior security advisor at Rook Security. It’s a relentless mantra in information security community: “People are the weakest link.” The success of email phishing, watering hole attacks, and over-the-phone social engineering tactics proves that attackers just have to target people in order to sidestep several layers of defense in depth measures. Most security…

  • InfoSec Conversations With Your People, Partners

    by Fahmida Y. Rashid on March 2, 2015

    Let's talk about what we've done so far this year. You have projects for making your organization more secure. You probably already dealt with some fires. You are also having regular conversations about security with your executives, users, and the board. Are you talking with your suppliers? We've seen over the past few months how attackers can come at you by targeting suppliers. Organizations…

  • My First RSA Conference: Exciting Professional Diversity and a Pinch of Fear

    by Rita S. Heims on February 26, 2015

    My good friend Jon Stanley invited me to speak on his panel at RSAC 2015. This will be my first time at the conference, let alone as a speaker. Over the past two decades as a lawyer and law professor, I’ve been to plenty of conferences: grand ones organized by professional membership associations with fancy keynotes speakers and high production value; little academic ones where only the twenty…

  • RSA Conference Proudly Expands Into Abu Dhabi!

    by Linda Gray on February 25, 2015

    With RSA Conference 2015 just around the corner in San Francisco, we are hearing a lot of excitement and feedback from our community regarding new session formats such as the crowdsourced track and our revamped Sandbox with various experiential learning opportunities. However, if you thought we were focusing only on US content, you’re wrong! After seeing a record number of attendees at last year's…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 03 Aug 2015 04:38:44 -0400.
© 2015 EMC Corporation. All rights reserved.