Blogs

  • Ally's Picks - #SecurityChat on #Privacy

    by Ally Lorentson Dunn on September 30, 2013

    We recently hosted a Twitter chat with security experts on a handful of hot topics around online privacy. One of the questions we asked was, “Who should define expectations for data privacy?” Dejan Kosutic: Organizations must define which information they consider private through classification process. Government should set the standards for privacy of individuals through personal data…

  • California’s New “Eraser” Privacy Law Aimed at Protecting Minors

    by Stephen Wu on September 29, 2013

    On September 23, 2013, Governor Jerry Brown signed a new piece of legislation aimed at the online protection of minors. Designated Senate Bill 568, the new law received publicity for giving minors an “Internet eraser,” requiring online services to provide a mechanism by which minors can remove their own social media and other online content. This mechanism is intended to give minors the ability…

  • Security Blogger Q&A - Vaughn Regelin

    by Ally Lorentson Dunn on September 24, 2013

    This week we're highlighting the blog of Phoenix TS, a woman-owned IT training and certification provider based in the greater DC metropolitan area. Vaughn Regelin, Phoenix TS: IT Security Blog http://www.phoenixts.com/blog/ Describe your blog in one sentence: The latest developments and more on information security around the world. Complete this sentence: “The RSA Conference is where you need to…

  • SCADA and Me

    by Ben Rothke on September 12, 2013

    When is the right time to talk to your kids about SCADA? According to the new book SCADA and Me, the time is now. The book bills itself as a book for children and management. Truth be told, that is a hard, if not impossible combination to write for. The reality is that SCADA is not child’s play. The underlying theme of the book is that SCADA is critical to our national infrastructure and that it’s…

  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    by Ben Rothke on September 10, 2013

    It has been about 8 years since my friend Richard Bejtlich’s (note, that was a full disclosure ‘my friend’) last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this highly informative and actionable…

  • Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger

    by Ben Rothke on September 7, 2013

    In Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, Professor Harvey Molotch argues that the government is worrying about the wrong things, and wasting huge amounts of money in the process. With a focus on post 9-11 events, he suggests that while significantly more security measures are in place, most people do not feel safer, and it is even arguable…

  • Security Blogger Q&A - Security Spread

    by Ally Lorentson Dunn on September 5, 2013

    Jay, Security Spread: Security Awareness http://securityspread.com Describe your blog in one sentence: Creating security awareness with the main focus on Mac. How did you become interested in information security? No one could provide me with answers when it came to security as it was/is a taboo for Mac users. So, I set out to learn and find my own answers. Why did you decide to blog about…

  • The Perils of Audits

    by Gib Sorebo on August 31, 2013

    Among critical infrastructure asset owners, a common device for ensuring that their cybersecurity risk posture is appropriate is an audit. We'll leave aside whether the motivation is compliance or simply a desire to be as secure as possible against attacks. In essence, both motivations often lead to the disaster that is the audit whether it is driven by "best practices" or a particular compliance…

  • Practical Anonymity: Hiding in Plain Sight Online

    by Ben Rothke on August 29, 2013

    With that news that the NSA is monitoring much of the traffic on the Internet, many people are looking to go below the radar. In Practical Anonymity: Hiding in Plain Sight Online, author Peter Loshin shows how to make anonymous use of the Internet. Much of this brief book (130 pages) is on the use of tools such as Tor and Tails. Looks to be interesting. Full review to follow. ISBN 978-0124104044

  • Why Have a Privacy Policy

    by Stephen Wu on August 28, 2013

    Privacy has been a hot legal issue for years, and the temperature is moving even higher. Governmental enforcement actions and class action suits have become ever more common. One common trigger is a data privacy or security breach. Surprisingly, in 2013, another common trigger is the lack of a privacy policy. Yes, there are some companies that create online services or Internet applications…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 29 Jul 2014 04:41:12 -0400.
© 2014 EMC Corporation. All rights reserved.