Menu

Blogs

  • The Digital Crown: Winning at Content on the Web

    by Ben Rothke on January 13, 2014

    With Adobe Flash, it’s possible to quickly get a pretty web site up and running; something that many firms do. But if there is no content behind the flashy web page, it’s unlikely anyone will return. And that is precisely the mistake far too many firms make with their corporate web sites. In The Digital Crown: Winning at Content on the Web, author Ahava Leibtag does a fantastic job on showing in…

  • FedRAMP: It's Not Just for the Government Anymore

    by John Linkous on January 9, 2014

    For years, information security professionals, analysts, and pundits have all been pointing out the security risks inherent in cloud computing. Far from being a "Chicken Little" message, these concerns have been backed up by nonstop real-world incursions into cloud services, including major successful attacks on customer-facing cloud environments hosted by Adobe, LinkedIn, CloudFlare, and others. …

  • Security Industry is the real Wolf of Wall Street

    by Alex Bender on January 7, 2014

    Consumer-facing social technologies typically get the lion’s share of buzz around financial news, but FireEye’s $1 billion acquisition of Mandiant is ringing up and down Wall Street. This deal is just the latest in a line of IPOs, M&As and funding announcements thrusting security into the mainstream and attracting attention from global investors. If you take a page out of Det. Lester Freamon’s…

  • Event Denial: If I Don't Report It, Did It Really Happen?

    by Christopher Burgess on January 7, 2014

    "If a tree falls in the forest and no one is there to hear it, does it make a sound?" The technological equivalent of this query within cyber security exists, unfortunately: "If a compromise occurs and no one reports it, did it really happen?" The answer in both instances is, "of course." Yet the recent survey of 200 security professionals by Opinion Matters for Threat Track reveals that two-th…

  • Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

    by Ben Rothke on January 6, 2014

    It wasn’t that long ago that a cover letter, resume and fax number was all that was required to apply for a job. Using that approach in 2014 will likely restrict your ability to get your next job. In Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game, author Josh More notes that since people will only look for a job every few years or perhaps once in a decade; even though they have…

  • Let the Games Begin

    by Security Bloggers Meetup on January 2, 2014

    It's that time. Invitations for the Security Bloggers Meetup at RSA Conference 2014 have gone out, which means that the RSVP scramble has officially begun. We're all really excited and we hope you are, too. This year we're taking over Jillian's, so it will be a truly private event. The same rules apply but we'll be able to let more people join the party and, well, let you all have run of the…

  • What Makes a Blogger? (SBM-Style)

    by Security Bloggers Meetup on January 2, 2014

    Rich here, Back when we first started the Security Blogger's Meetup it was pretty easy to define a security blogger, at least for admission purposes. You had a blog, you used the word "security" in it, and one of us knew you. The blogging landscape has changed significantly since those simpler days. Some bloggers moved to other social media channels (hello Twitter!), and most corporations now use…

  • Introduction to Computer Networks & Cybersecurity

    by Ben Rothke on January 2, 2014

    To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference. Today, nearly every piece of data that needs to be secured is in some way or another connected to a network. With that in mind, the book…

  • 2014 Security Bloggers Meetup Details

    by Security Bloggers Meetup on January 1, 2014

    Wow, 2014! Let that roll off of your tongue a few times. Well time and security blogging march on. This year the planning committee for the RSA Conference Security Bloggers Meetup has been hard at work to make this the biggest and best Bloggers Meetup and Blogging Awards event ever. We have doubled the capacity of our venue so we will not have to turn down anyone who wants to come join us and is…

  • New Target Data Breach Lawsuits

    by Stephen Wu on December 31, 2013

    The recent massive data breach into Target’s payment systems compromising millions of payment card numbers is now on the list of the most infamous breaches. In addition, stories are now appearing in news media about lawsuits being filed in the wake of the data breach by victims whose payment card information was believed stolen. I am writing this post to explain what a typical data breach lawsuit…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 19 Dec 2014 17:43:31 -0500.
© 2014 EMC Corporation. All rights reserved.