Blogs

  • Critical Infrastructure Security Is Key to Homeland Security

    by Christopher Burgess on November 10, 2014

    The US Department of Homeland Security (DHS) is the model that most often comes to mind when broaching the subject of national security. The DHS takes critical role in the protection of its infrastructure—electric, water, gas, transport, etc. The DHS, via the US-CERT (Cyber Emergency Response Team), produces alerts, advisories, and reports that not only keep government clientele well informed, but…

  • Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

    by Ben Rothke on November 10, 2014

    A word to describe Takedown: The Pursuit and Capture of America's Most Wanted Computer Outlaw was hyperbole. While the general storyline from the 1996 book was accurate, filler was written that created the legend of Kevin Mitnick. This in turn makes the book a near work of historical fiction. Much has changed in nearly 20 years and Countdown to Zero Day: Stuxnet and the Launch of the World's First…

  • The Bright Future of Mobile Payments

    by John Linkous on November 7, 2014

    Cashless payment for goods and services continues to evolve, and mobile payments are quickly becoming the battleground for new products and technologies that drive consumer and merchant convenience. Such payments ensure rapid payment for credit issuers and other constituents in the transaction chain. Some of these technologies are still evolving and represent truly revolutionary approaches, while…

  • The Evolution of Data Mining for Security Operations

    by John Linkous on November 6, 2014

    One of the more depressing pieces of information from Verizon's 2014 Data Breach Investigations Report is the fact that, over the past five years, the time difference between when a data breach occurs and when it is discovered has been on the rise. Yes, that's right: despite investing in countless security tools to detect security threats, we're actually getting worse at the job. This is largely…

  • Webcast Recap: Finding Security Resources Inside Your Organization

    by Fahmida Y. Rashid on November 5, 2014

    As part of the budget planning exercise, security leaders have to prioritize their projects and initiatives for the next year. Savvy security leaders know to look for security resources in other areas of the organization, Denim Group principal John Dickson said in a recent RSAC webcast. "This is not about vendors selling security solutions to CISOs or CSOs," Dickson said. "This is about internal…

  • News Pick: Data Breach Targets Speak

    by Fahmida Y. Rashid on November 4, 2014

    While any organization can suffer a data breach, some organizations seem to be bigger targets than others. Representatives from financial services, retail, media, and healthcare organizations talked about their security strategies at this year's Privacy Xchange Forum in Scottsdale, Ariz., Dark Reading reported. Not all industry sectors face the same threats. Organizations have to finetune their…

  • Security Reality: Special Challenges in Q4

    by Fahmida Y. Rashid on November 3, 2014

    The end of the year is a busy time for information security professionals. There are a lot of balls to juggle, and our adversaries are poised to attack if we look in the wrong direction. The team behind Target’s data breach last year took advantage of the retailer’s increased traffic volume—both online as well as through its brick-and-mortar stores—to sneak in and infect the point-of-sale…

  • Security Infrastructure: What Does It Really Entail?

    by Robert Moskowitz on October 31, 2014

    For years, the goal behind security infrastructure has been to thwart—or at least, mitigate—malicious attacks against an organization's secure data. But in today's world of interconnected computer systems and new generation of information technology capabilities, this old-style infrastructure is no longer capable of guaranteeing privacy for sensitive data. Modern industry needs requires features…

  • Update on charity:water Efforts in Nepal

    by Linda Gray on October 30, 2014

    As many of you know, at RSA Conference in San Francisco this past February, we joined the charity: water mission asking our attendees to participate in a Waterwalk. In exchange for their participation, RSA Conference vowed to make a donation that would help fund two water projects for schools in Nepal. In August we checked in with charity: water Growth Associate, Makena Cunningham, for a Q&A on the…

  • Network Security Appliance: Build or Buy?

    by Joshua Marpet on October 29, 2014

    Monitoring your network can be a seriously unpleasant task. It involves everything from maintaining firewall rules, watching traffic, looking for problems, keeping track of the latest issues on the Internet, checking log data on the dashboard, correlating events—oh dear God, it keeps going! So, what do you do? Do you use a myriad of tools, stitch them together with some scripting, document the…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 26 Nov 2014 00:02:31 -0500.
© 2014 EMC Corporation. All rights reserved.