Blogs

  • Starting RSA Conference 2014 with a Bang: Monday Seminars

    by Jeanne Friedman on January 20, 2014

    Getting to RSA Conference early? RSA Conference has a wide range of sessions available to attend before the grand opening on Tuesday morning. Association Events – open to all badge types CSA Summit 2014: In Global Clouds We Trust? – 9:00 AM – 1:00 PM The Cloud Security Alliance Summit this year will feature global policy makers and industry debating our industry’s seminal issue: can we trust…

  • 4 Ways Social Network Engagement Can Derail a Company

    by Christopher Burgess on January 16, 2014

    Social network engagement is mainstream. Rare is the company who does not have a presence on a social network, with engagement including customer education and support, product launch, personnel recruitment, and competitive intelligence. Yet we continue to see occasions where improper employee use of technology can result in loss of intellectual property, inappropriate use of a social network for…

  • Introducing the Viewing Point

    by Linda Gray on January 13, 2014

    Every year after RSA Conference, our team reviews feedback we’ve received directly from our attendees to make changes that can have a real impact on their experience. This year’s discovery is that our attendees want to access and consume information and content in different ways that best suit their busy lifestyles, and specific needs. To that end, I’m happy to introduce The Viewing Point. Brand…

  • The Digital Crown: Winning at Content on the Web

    by Ben Rothke on January 13, 2014

    With Adobe Flash, it’s possible to quickly get a pretty web site up and running; something that many firms do. But if there is no content behind the flashy web page, it’s unlikely anyone will return. And that is precisely the mistake far too many firms make with their corporate web sites. In The Digital Crown: Winning at Content on the Web, author Ahava Leibtag does a fantastic job on showing in…

  • FedRAMP: It's Not Just for the Government Anymore

    by John Linkous on January 9, 2014

    For years, information security professionals, analysts, and pundits have all been pointing out the security risks inherent in cloud computing. Far from being a "Chicken Little" message, these concerns have been backed up by nonstop real-world incursions into cloud services, including major successful attacks on customer-facing cloud environments hosted by Adobe, LinkedIn, CloudFlare, and others. …

  • Security Industry is the real Wolf of Wall Street

    by Alex Bender on January 7, 2014

    Consumer-facing social technologies typically get the lion’s share of buzz around financial news, but FireEye’s $1 billion acquisition of Mandiant is ringing up and down Wall Street. This deal is just the latest in a line of IPOs, M&As and funding announcements thrusting security into the mainstream and attracting attention from global investors. If you take a page out of Det. Lester Freamon’s…

  • Event Denial: If I Don't Report It, Did It Really Happen?

    by Christopher Burgess on January 7, 2014

    "If a tree falls in the forest and no one is there to hear it, does it make a sound?" The technological equivalent of this query within cyber security exists, unfortunately: "If a compromise occurs and no one reports it, did it really happen?" The answer in both instances is, "of course." Yet the recent survey of 200 security professionals by Opinion Matters for Threat Track reveals that two-th…

  • Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

    by Ben Rothke on January 6, 2014

    It wasn’t that long ago that a cover letter, resume and fax number was all that was required to apply for a job. Using that approach in 2014 will likely restrict your ability to get your next job. In Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game, author Josh More notes that since people will only look for a job every few years or perhaps once in a decade; even though they have…

  • Introduction to Computer Networks & Cybersecurity

    by Ben Rothke on January 2, 2014

    To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference. Today, nearly every piece of data that needs to be secured is in some way or another connected to a network. With that in mind, the book…

  • Let the Games Begin

    by Security Bloggers Meetup on January 2, 2014

    It's that time. Invitations for the Security Bloggers Meetup at RSA Conference 2014 have gone out, which means that the RSVP scramble has officially begun. We're all really excited and we hope you are, too. This year we're taking over Jillian's, so it will be a truly private event. The same rules apply but we'll be able to let more people join the party and, well, let you all have run of the…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 24 Jul 2014 09:01:07 -0400.
© 2014 EMC Corporation. All rights reserved.