Blogs

  • Risky Business: Changing Models for Information Risk Management

    by John Linkous on July 10, 2014

    For many years, information risk management (IRM) has been an evolving discipline. Never having been quite as advanced as financial or operational risk-modeling capabilities within the enterprise, IRM has often been relegated to a more esoteric, simplistic role in organizations. At this year's RSA Conference 2014 in San Francisco, however, the evolving—and improving—maturity of IRM in the…

  • Talking Security, Online - Continuing the Conversation

    by Fahmida Y. Rashid on July 9, 2014

    Information security professionals tend to be smart, savvy, and quite opinionated. They are the guardians, protecting the network and information. They are warriors, using whatever tools are at hand to fight threats. They have interesting stories, and it is my privilege to tell them. The experts in the field are many, including researchers, developers, administrators, managers, and executives, …

  • RSAC Family Continues to Grow: A Warm Welcome to Fahmida Y. Rashid!

    by Alex Bender on July 8, 2014

    As many within our community know, RSA Conference goes beyond just yearly events in the U.S., Europe and Asia Pacific and Japan. We strive to keep the conversations that begin at these events going throughout the year with programs like our webcasts, blogs, videos, podcasts and Twitter Chats. And you’re only going to see more of this as we expand our content strategy to engagement events like…

  • Data-Driven Security: Analysis, Visualization and Dashboards

    by Ben Rothke on July 7, 2014

    There is a not so fine line between data dashboards and other information displays that provide pretty but otherwise useless and unactionable information; and those that provide effective answers to key questions. Data-Driven Security: Analysis, Visualization and Dashboards is all about the later. In this extremely valuable book, authors and noted experts Jay Jacobs and Bob Rudis bring their…

  • When Culture and Security Collide

    by Alex Bender on July 7, 2014

    I talked about Security Protocols before it was cool: What happens when culture and security collide? On March 10, 2014, attendees of the music, film and interactive conference and festival South by Southwest (SXSW) crammed into two overflowing rooms for what many would later claim to be the most talked about event of the show. Former NSA contractor Edward Snowden addressed the SXSW audience via…

  • Keeping Private Data Private: Tips and Tricks

    by Joshua Marpet on July 4, 2014

    Companies produce data. Some of it is public data, some private data. The classification of data into public and private is important, but right now, the means to keep data private is incredibly important as well. Keeping data private is a process. It starts with examining the use cases for the data. Is this piece of information going to be used every day? Or does it just need to be stored in…

  • Complimentary Visitor Pass Launched for RSA Conference Asia Pacific & Japan

    by Linda Gray on July 3, 2014

    With just 3 weeks to go until the start of RSA ® Conference Asia Pacific & Japan, today we’ve launched a complimentary Visitor Pass which gives registrants access to the Exhibition and Keynotes on Wednesday 23 rd July. Like last year, we’re sure this pass will prove popular, particularly for those people who are stretched for time and can’t spend 2 full days out of the office, or who simply want to…

  • When Apps Attack! What Is – and Isn't – Application Security

    by John Linkous on July 2, 2014

    One of the most interesting subjects at RSA Conference 2014 was the defense of software code, in all its many forms. While many of the developer-centric tracks and sessions were heavily focused on eliminating flaws within code, one of the key messages that crossed the boundary of speaking events is the idea of what is—and is not—application security. Black-box testing of apps is a fascinating…

  • Cyber Crime, Security and Digital Intelligence

    by Ben Rothke on June 30, 2014

    Cyber Crime, Security and Digital Intelligence by Mark Johnson is a high-level introductory text to information security. The books 12 chapters cover the following topics: Threats to key sectors Cyber security fundamentals Cyber-attack fundamentals Organized cyber attacks Cloud risks Web 2.0 risks Cyber security threat actors Common vulnerabilities Cyber security control frameworks Cyber security…

  • Security Metrics You Should Be Watching for New Insights

    by David Wallace on June 30, 2014

    It's been more than 15 years since my identity, bank account, and credit history were taken hostage by some folks in the Bronx. By one set of security metrics, last year was a good year because there was no repeat failure. I've used "fraud alerts" on accounts to notify me in case of improper activity and been vigilant about credit reports and monitoring FICO scores, but I don't know if I'm any…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 25 Jul 2014 14:22:10 -0400.
© 2014 EMC Corporation. All rights reserved.