Blogs

  • Security Industry is the real Wolf of Wall Street

    by Alex Bender on January 7, 2014

    Consumer-facing social technologies typically get the lion’s share of buzz around financial news, but FireEye’s $1 billion acquisition of Mandiant is ringing up and down Wall Street. This deal is just the latest in a line of IPOs, M&As and funding announcements thrusting security into the mainstream and attracting attention from global investors. If you take a page out of Det. Lester Freamon’s…

  • Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

    by Ben Rothke on January 6, 2014

    It wasn’t that long ago that a cover letter, resume and fax number was all that was required to apply for a job. Using that approach in 2014 will likely restrict your ability to get your next job. In Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game, author Josh More notes that since people will only look for a job every few years or perhaps once in a decade; even though they have…

  • What Makes a Blogger? (SBM-Style)

    by Security Bloggers Meetup on January 2, 2014

    Rich here, Back when we first started the Security Blogger's Meetup it was pretty easy to define a security blogger, at least for admission purposes. You had a blog, you used the word "security" in it, and one of us knew you. The blogging landscape has changed significantly since those simpler days. Some bloggers moved to other social media channels (hello Twitter!), and most corporations now use…

  • Introduction to Computer Networks & Cybersecurity

    by Ben Rothke on January 2, 2014

    To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference. Today, nearly every piece of data that needs to be secured is in some way or another connected to a network. With that in mind, the book…

  • Let the Games Begin

    by Security Bloggers Meetup on January 2, 2014

    It's that time. Invitations for the Security Bloggers Meetup at RSA Conference 2014 have gone out, which means that the RSVP scramble has officially begun. We're all really excited and we hope you are, too. This year we're taking over Jillian's, so it will be a truly private event. The same rules apply but we'll be able to let more people join the party and, well, let you all have run of the…

  • 2014 Security Bloggers Meetup Details

    by Security Bloggers Meetup on January 1, 2014

    Wow, 2014! Let that roll off of your tongue a few times. Well time and security blogging march on. This year the planning committee for the RSA Conference Security Bloggers Meetup has been hard at work to make this the biggest and best Bloggers Meetup and Blogging Awards event ever. We have doubled the capacity of our venue so we will not have to turn down anyone who wants to come join us and is…

  • Dos & Don’ts for Submitting to RSA Conference’s Innovation Sandbox Competition

    by Paula Belikove on December 31, 2013

    Kicking-off the Conference week on February 24, 2014 Innovation Sandbox promotes new technology, new ways of thinking, and provides advice and counsel for entrepreneurs while also exposing the RSA Conference community to venture capital professionals, industry experts, senior level business practitioners and thought leaders. At this half-day event, attendees view demonstrations from the rising…

  • New Target Data Breach Lawsuits

    by Stephen Wu on December 31, 2013

    The recent massive data breach into Target’s payment systems compromising millions of payment card numbers is now on the list of the most infamous breaches. In addition, stories are now appearing in news media about lawsuits being filed in the wake of the data breach by victims whose payment card information was believed stolen. I am writing this post to explain what a typical data breach lawsuit…

  • We are RSA Conference

    by Alex Bender on December 30, 2013

    Since 1991, RSA Conference has established itself as the destination where the world talks security. It’s emerged from a small group of technical experts to a mainstream gathering of the best professionals discussing how to enable business in an insecure world. Headlines do not lie. The dedicated work our attendees, speakers and exhibitors strive to complete each day is the fuel that propels…

  • Digital Archaeology: The Art and Science of Digital Forensics

    by Ben Rothke on December 23, 2013

    The book Digital Archaeology: The Art and Science of Digital Forensics starts as yet another text on the topic of digital forensics. But by the time you get to chapter 3, you can truly appreciate how much knowledge author Michael Graves imparts. Archaeology is defined as the study of human activity in the past, primarily through the recovery and analysis of the material culture and environmental…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 31 Oct 2014 17:29:17 -0400.
© 2014 EMC Corporation. All rights reserved.