Blogs

  • Meeting Your Peers, Colleagues and Friends at RSA Conference

    by Linda Gray on January 22, 2014

    We consistently hear that one of the main reasons people attend RSA Conference is to meet people and make industry contacts. To help facilitate those interactions there’s a number of special events during the Conference and I wanted to take a minute to highlight some of them to you. Monday February 24th Orientation If you’ve never been to RSA Conference before, then come along to our Orientation…

  • 5 Tips for Handling Compromised Customer Data

    by Christopher Burgess on January 21, 2014

    Rarely does a week go by when you don't hear or read of a data breach and the accompanying loss of customer data or client personal identifying information (PII). Having a data breach plan in place that provides an honest, direct, and customer-centric solution will go a long way toward retaining the customers or clients affected. Though no one ever wants these things to happen, data breaches do…

  • Starting RSA Conference 2014 with a Bang: Monday Seminars

    by Jeanne Friedman on January 20, 2014

    Getting to RSA Conference early? RSA Conference has a wide range of sessions available to attend before the grand opening on Tuesday morning. Association Events – open to all badge types CSA Summit 2014: In Global Clouds We Trust? – 9:00 AM – 1:00 PM The Cloud Security Alliance Summit this year will feature global policy makers and industry debating our industry’s seminal issue: can we trust…

  • 4 Ways Social Network Engagement Can Derail a Company

    by Christopher Burgess on January 16, 2014

    Social network engagement is mainstream. Rare is the company who does not have a presence on a social network, with engagement including customer education and support, product launch, personnel recruitment, and competitive intelligence. Yet we continue to see occasions where improper employee use of technology can result in loss of intellectual property, inappropriate use of a social network for…

  • The Digital Crown: Winning at Content on the Web

    by Ben Rothke on January 13, 2014

    With Adobe Flash, it’s possible to quickly get a pretty web site up and running; something that many firms do. But if there is no content behind the flashy web page, it’s unlikely anyone will return. And that is precisely the mistake far too many firms make with their corporate web sites. In The Digital Crown: Winning at Content on the Web, author Ahava Leibtag does a fantastic job on showing in…

  • Introducing the Viewing Point

    by Linda Gray on January 13, 2014

    Every year after RSA Conference, our team reviews feedback we’ve received directly from our attendees to make changes that can have a real impact on their experience. This year’s discovery is that our attendees want to access and consume information and content in different ways that best suit their busy lifestyles, and specific needs. To that end, I’m happy to introduce The Viewing Point. Brand…

  • FedRAMP: It's Not Just for the Government Anymore

    by John Linkous on January 9, 2014

    For years, information security professionals, analysts, and pundits have all been pointing out the security risks inherent in cloud computing. Far from being a "Chicken Little" message, these concerns have been backed up by nonstop real-world incursions into cloud services, including major successful attacks on customer-facing cloud environments hosted by Adobe, LinkedIn, CloudFlare, and others. …

  • Event Denial: If I Don't Report It, Did It Really Happen?

    by Christopher Burgess on January 7, 2014

    "If a tree falls in the forest and no one is there to hear it, does it make a sound?" The technological equivalent of this query within cyber security exists, unfortunately: "If a compromise occurs and no one reports it, did it really happen?" The answer in both instances is, "of course." Yet the recent survey of 200 security professionals by Opinion Matters for Threat Track reveals that two-th…

  • Security Industry is the real Wolf of Wall Street

    by Alex Bender on January 7, 2014

    Consumer-facing social technologies typically get the lion’s share of buzz around financial news, but FireEye’s $1 billion acquisition of Mandiant is ringing up and down Wall Street. This deal is just the latest in a line of IPOs, M&As and funding announcements thrusting security into the mainstream and attracting attention from global investors. If you take a page out of Det. Lester Freamon’s…

  • Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

    by Ben Rothke on January 6, 2014

    It wasn’t that long ago that a cover letter, resume and fax number was all that was required to apply for a job. Using that approach in 2014 will likely restrict your ability to get your next job. In Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game, author Josh More notes that since people will only look for a job every few years or perhaps once in a decade; even though they have…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 02 Oct 2014 08:26:49 -0400.
© 2014 EMC Corporation. All rights reserved.