• The Case for Researcher Self-Regulation

    by Wendy Nather on October 29, 2015

    We're all familiar with the attacker versus defender dynamic, and how it plays out culturally in the security industry -- just say the word "cyber" and see who winces, for example. But it all used to stay "in the family," where red and blue team activities were confined to security professionals, either within security vendor companies or within organizations that had their own security staff. …

  • Protecting your Family Against Threats Associated with the Internet of Toys

    by RSAC Contributor on October 26, 2015

    This post comes from Ed Skoudis, a member of the RSA Conference Advisory Board Remember the Island of Misfit Toys from the enduring holiday classic, Rudolph the Red-Nosed Reindeer? Outcast toys just woefully waiting around for Santa to aid them, hoping to find a suitable home so that they could leave their tear-stained island. Well, those toys wouldn’t have the same problems today—they could be…

  • Think Security Is Expensive? Insecurity Costs Much More

    by Tony Bradley on October 23, 2015

    Security has come a long way over the past decade. It is still the red-headed step child of the business units but at least most organizations have some sort of CSO or CISO role in place and do a good job feigning support for security. Businesses that focus on squeaking by spending as little as possible on security, though, are bound to find out the hard way just how expensive a lack of security…

  • Securing Today’s Online Kids: Education is the Key

    by Lance Spitzner on October 22, 2015

    As a security awareness professional and a father of three, my passion is helping organizations around the world create more secure employees and teaching kids to be safe online. On Oct. 28, I discuss what we, as parents, can do to secure kids. In previous posts I provided an overview of what we will be covering in that webcast and the challenges we face. In this post, I discuss what we can do, …

  • Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center

    by Ben Rothke on October 21, 2015

    Building a large enterprise data center is a mammoth task with myriad details. In an encyclopedic work, Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center, (Morgan Kaufmann ISBN 978-0128014134), authors Caesar Wu and Rajkumar Buyya have written an extremely detailed and comprehensive guide on how to effectively build a cloud data center. …

  • How Windows 10 Tackles Enterprise Privacy

    by RSAC Contributor on October 20, 2015

    This post comes from Bogdan Botezatu, a security researcher with BitDefender. With Microsoft releasing the new Windows 10, privacy concerns came up while some of the new “telemetry” features were showcased. For consumers, this telemetry opt-in when you install can be summed up as an “improving customer satisfaction” feature. Still “Basic” Privacy for Windows 10 Users While all information is…

  • Why It Costs More to Protect Your Virtual Infrastructure

    by Tony Bradley on October 19, 2015

    Security incidents are expensive, but not all security incidents are created equally. A recent study found that businesses pay a significant premium for incident response and recovery affecting a virtual infrastructure. Respondents representing more than 5,500 different companies across 25 different countries participated in the survey. The purpose of the survey was to learn more about the cost of…

  • Securing Today’s Online Kids: A New Landscape

    by Lance Spitzner on October 15, 2015

    As a security professional, my passion is helping organizations around the world create more secure environments. As a father of three, that passion extends to kids. For National CyberSecurity Awareness Month (also now known as #CyberAware), I am working with RSA Conference on the CyberSafety: Kids initiative. On Oct. 28, I will talk about what we, as parents, can do to secure kids as part of the …

  • Taking Stock: Ranking the Next Billion-Dollar CyberSecurity Markets

    by RSAC Contributor on October 14, 2015

    This post in our VC-series comes from Venky Ganesan, managing director and cybersecurity investor of Menlo Ventures. With IT security spending estimated to crest the $75 billion annual mark before the end of 2015, there’s no shortage of emerging security sectors that will soon cross $1 billion in annual revenues. At the same time, with so many startups pursuing cybersecurity solutions, venture…

  • RSA Conference 2016 Introduces New Learning Opportunities for Small Group Engagement

    by Britta Glade on October 9, 2015

    RSA Conference 2016 promises to be an amazing experience for our attendees. Aside from all of the great things in store to help us celebrate our 25 th anniversary—and there are some fabulous things you will not want to miss!—we are planning to introduce several new opportunities and restructure some current ones in our educational lineup to help our attendees maximize their time and investment at…

This document was retrieved from on Sat, 28 Nov 2015 15:14:41 -0500.
© 2015 EMC Corporation. All rights reserved.