Menu

Blogs

  • We Welcome Our New Automation Overlords

    by Securosis Team on February 5, 2015

    This post is by Rich Mogull, analyst and CEO of Securosis, an independent security research firm. I am inherently lazy. If I can come up with some new, automated way to solve a problem and save some time, I'll spend many hours more than it would take to knock it out manually on the off chance of some future time savings. But I understand I'm a bit unusual that way (and it is sometimes to my…

  • Catching Up With Innovation Sandbox Winners: Invincea

    by Fahmida Y. Rashid on February 5, 2015

    RSA Conference is looking for companies innovating in information security. Is that you? Every year, RSA Conference showcases 10 companies with innovative information security products as part of its Innovation Sandbox Contest. RSA Conference 2015 marks the tenth year of the competition, and to mark that milestone, we asked past winners how they've fared over the past few years. During Innovation…

  • Working With Government: Information Sharing Laws

    by Todd Inskeep on February 4, 2015

    This is the second post in a multi-part series. The first post is here. Information sharing is one major aspect of the current calls for action on National Cyber Security issues. As I noted earlier, lawers, company executives, government officials and others have differing views on the need for new laws regarding information sharing. Information sharing has been discussed in the context of the…

  • Changing the Security Conversation One Topic at a Time

    by Fahmida Y. Rashid on February 3, 2015

    Just two months into 2015, and there is already a theme in information security: let's talk. Let's talk within the organization, within the industry, with the government, with everyone else. It's not a new concept. The hallmark of a good security professional is one who can communicate effectively with end users, business stakeholders, and the board of directors. Information security…

  • Social Media Security: Leveraging Social Networking While Mitigating Risk

    by Ben Rothke on February 3, 2015

    A firm can spend decades building a brand into one that inspires trust. Unfortunately, social media can quickly destroy that trust in an instant. In Social Media Security: Leveraging Social Networking While Mitigating Risk, author Michael Cross provides a comprehensive overview of the security and privacy risks around social media. The book lives up to its title and effectively shows the reader…

  • Catching Up With Innovation Sandbox Winners: Sourcefire

    by Fahmida Y. Rashid on February 2, 2015

    The Innovation Sandbox Contest turns 10 this April! Every year, RSA Conference showcases 10 companies with innovative information security products on the market as part of its Innovation Sandbox Contest. Teams from each company present and demonstrate their product in front a panel of judges and answer questions. This year's winner will be named “Most Innovative Company at RSA Conference 2015.”…

  • Network Security: Does Your Network Resemble a Sieve?

    by Christopher Burgess on January 29, 2015

    The new year is on the here and you're putting together the goals and objectives for your network security team. The number of data breaches during the past year have finally caught the attention of your company's board of directors and executive decision makers. Resources have always been tight, but this year there is an allocation to secure the company's networks. It would appear that the years…

  • Crowdsourced Submissions at RSA Conference is Open!

    by Fahmida Y. Rashid on January 29, 2015

    You can now submit your talk for Crowdsourced Submissions at RSA Conference! This is your chance to see if the idea you’ve been working on can be part of the RSA Conference program in April. RSA Conference introduced Crowdsourced Submissions as a new session type for this year's conference. There are a ton of great ideas and insights out there—the quality and quantity of submissions for the trad…

  • Getting “Eyes on the Glass” for Critical Infrastructure

    by Gib Sorebo on January 29, 2015

    It’s sort of ironic that the sector with the most 24x7 control rooms, still struggles with monitoring for cyber attacks. However, the critical infrastructure sectors, for the most part, change slowly. And while they have always appreciated the need to monitor operations around the clock, those operations had been largely self-contained with limited exposure to outside networks. Consequently, …

  • Designing and Building a Security Operations Center

    by Ben Rothke on January 28, 2015

    Many organizations are overwhelmed by the onslaught of security data from disparate systems, platforms and applications. They have numerous point solutions (anti-virus, firewalls, IDS/IPS, ERP, access control, IdM, single sign-on, etc.) that can create millions of daily log messages. In addition to directed attacks becoming more frequent and sophisticated, there are regulatory compliance issues…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 27 Feb 2015 02:30:43 -0500.
© 2015 EMC Corporation. All rights reserved.