Blogs

  • Why Have a Privacy Policy

    by Stephen Wu on August 28, 2013

    Privacy has been a hot legal issue for years, and the temperature is moving even higher. Governmental enforcement actions and class action suits have become ever more common. One common trigger is a data privacy or security breach. Surprisingly, in 2013, another common trigger is the lack of a privacy policy. Yes, there are some companies that create online services or Internet applications…

  • Security Blogger Q&A - Elliott Frantz

    by Ally Lorentson Dunn on August 26, 2013

    Elliott Frantz, Virtue Security: http://www.virtuesecurity.com/blog/ Describe your blog in one sentence: Application security for ethical hacking professionals. Complete this sentence: “The RSA Conference is a world in its own. ” How did you become interested in information security? I started as teenager when I was just beginning high school. I was first interested in learning to program as a…

  • Hacking Exposed Mobile: Security Secrets & Solutions

    by Ben Rothke on August 26, 2013

    Little did anyone know that when the first Hacking Exposed books came out over 15 years ago, that it would launch a set of sequels on topics from Windows, Linux, web development, to virtualization and cloud computing, and much more. It was a series that launched a generation of script kiddies, in addition to security experts. In 2013, the newest edition is Hacking Exposed Mobile Security Secrets …

  • The Evolution of What We Value and How Much

    by Gib Sorebo on August 19, 2013

    In the current controversies involving what our intelligence community is collecting about its citizens, the issue has frequently been framed as a balance of protecting the personal safety of people versus protecting one’s privacy. While delving deeper may reveal a false dichotomy, we nonetheless must acknowledge that such tradeoffs do exist. At the very least, we’ve come to expect and accept…

  • Secret History: The Story of Cryptology

    by Ben Rothke on August 15, 2013

    In Secret History: The Story of Cryptology, author Craig Bauer notes that most available cryptology books primarily focus on either mathematics or history. Breaking this mold, the book gives a thorough yet accessible treatment of both the mathematics and history of cryptology. This looks to be a really interesting read. Full review to follow. Chapman Hall/CRC 1466561866 978-1466561861 Rothke

  • Europe Program Committee - Trends in Security

    by Ally Lorentson Dunn on August 14, 2013

    We posed the question below to our Europe Program Committee recently and their responses follow: Below is a word cloud for the titles of all the submissions for RSA Conference Europe 2013. Over the next 3 years what words do you think will get bigger, what words do you think will get smaller, will there be any new words, and why? In other words, what trends and priorities do you see in security…

  • The Healthy Programmer: Get Fit, Feel Better, and Keep Coding

    by Ben Rothke on August 12, 2013

    Diet books are literally a dime a dozen. They generally benefit only the author, publisher and Amazon, leaving the reader frustrated and bloated. With a failure rate of over 99%, diet books are the epitome of a sucker born every minute. One of the few diet books that can offer change you can believe in is The Healthy Programmer: Get Fit, Feel Better, and Keep Coding. Author Joe Kutner observes…

  • The Practice of Network Security Monitoring: Understanding Incident Detection & Response

    by Ben Rothke on August 8, 2013

    Full disclosure: the author of this book is a professional acquaintance of mine. It has been about 8 years since Richard Bejtlich’s last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this book, you…

  • Hacking Exposed Mobile Security Secrets and Solutions

    by Ben Rothke on August 5, 2013

    Little did anyone know that when the first Hacking Exposed book came out over 15 years ago, that it would launch a large set of sequels. In 2013, the newest version is Hacking Exposed Mobile Security Secrets & Solutions. When the first edition of Hacking Exposed was published, Windows was dominant. In 2013, Windows is a dying operating system and mobile is the new king. In the book, the authors…

  • The Healthy Programmer: Get Fit, Feel Better and Keep Coding

    by Ben Rothke on August 1, 2013

    Books on computer programming often make big claims; from quicker programming, more effective programming, less errors, etc. In The Healthy Programmer: Get Fit, Feel Better, and Keep Coding, author Joe Kutner says the bookmay actually save your life. Diseases like obesity and diabetes are at epidemic levels. Part of the problem is the sedentary lifestyle associated with such diseases. For the…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 20 Oct 2014 20:31:11 -0400.
© 2014 EMC Corporation. All rights reserved.