Menu

Blogs

  • The Cybersecurity Skills Gap: A Real or Manufactured Crisis?

    by Gib Sorebo on May 5, 2014

    Over the last few years, we’ve been bombarded with messages proclaiming a cybersecurity skills gap and associated statistics of positions going unfilled. For example, Cisco’s Annual Security Report estimated there were more than a million unfilled positions for security professionals world-wide. The Defense Department has said it plans to triple the number of “cyberwarriors” it employs by 2016 to…

  • BYOD Is Alive and Growing in APAC

    by Christopher Burgess on May 5, 2014

    Bring your own device (BYOD) adoption in APAC is alive and well, and is expected to increase by more than 20 percent from 2014 to 2020, according to a study by Grand View Research. Two driving factors for this growth are reduced hardware costs and the maturation of cloud-based solutions, and the devices of choice are smartphones and tablets. What's in it for the businesses? A report from…

  • When Intellectual Property Goes Out the Front Door

    by Christopher Burgess on May 1, 2014

    According to a 2012 survey by the Japanese Ministry of Economy, Trade, and Industry (METI) referenced in The Asahi Shimbun, it was revealed that of the 3,000 Japanese companies polled, 13.5 percent have had their intellectual property (IP) leaked or have suspected a leak over the past five years. The Asahi Shimbun goes on to describe how IP is being stolen by a variety of entities, both foreign and…

  • Webcast Q&A - Metrics: A How-To For The Success of Your Security Awareness Program

    by Ally Lorentson Dunn on April 29, 2014

    Last week we hosted a webcast with top rated speaker Katrina Rodzon. We had a great audience who sent in more questions than we had time to answer during the session. The questions that we could not get to on the live event are below with Katrina's responses. Jump over to our video page for the full replay of the session and the questions that were answered live. Question Answer How do you quantify…

  • Privacy Policy Developments and International Terror

    by Joshua Marpet on April 29, 2014

    Terrorism: The very word strikes fear into people. Even after over a decade of the "War on Terror," it's still frightening. What concrete outcomes have resulted from the war on terror today? It's been shown, studied, and proven that people are willing to give up privacy in order to get more security. Has this resulted in any day-to-day changes to the way the Internet works? Absolutely. Example? So…

  • Taking the Torch

    by Britta Glade on April 28, 2014

    I’ve lived my life with a few core drivers – drivers instilled in me by my parents that I try to pass on to my children: shoot for the stars by exercising and challenging your brain, pursue a career that you will enjoy, and make a positive impact in the world. The intersection of these three drivers is narrow and aspirational, I know, but the underlying guidance has always been clear: you can—and…

  • Designing with the Mind in Mind, a Simple Guide to Understanding User Interface Design Guideline

    by Ben Rothke on April 28, 2014

    Neurologists and brain scientists are in agreement that in truth, we know very little about how the human brain works. In the just released second edition of Designing with the Mind in Mind, a Simple Guide to Understanding User Interface Design Guidelines, author and UI expert Jeff Johnson provides a fascinating introduction to the fundamentals of perceptual and cognitive psychology for…

  • Reflecting Back on RSA Conference Content and Looking Forward to its Bright Future

    by Alex Bender on April 25, 2014

    In 2014, over 500 staffers worked tirelessly to make RSA Conference a success. From building the expo hall to registering more than 28,500 attendees, the Conference is the culmination of months of planning, collaboration and teamwork. For all we put into the show, it can be a bit surreal to see how fast the Moscone Center is dismantled on Friday. While the banners, A/V and booths are temporary, …

  • Requirements for Encryption of Payment Card Data

    by Robert Moskowitz on April 24, 2014

    There are many specific criteria that must be met in order to comply with requirements for cardholder data encryption for credit and debit cards. The Payment Card Industry Data Security Standard (PCI DSS) provides specific security measures designed to protect cardholders—as well as merchants, processors, acquirers, issuers, and service providers (and others in the industry) from malicious…

  • Passing the torch!

    by Jeanne Friedman on April 23, 2014

    After 7 years it is time for me to move on and explore new directions. I have seen the Conference grow so much over these years in the number of attendees, speakers, tracks, sessions, types of content and more. My favorite part of the job as content manager was getting to know the speakers and working with the Program Committees all over the world. I am awed by the ability of professionals who…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 19 Apr 2015 11:42:43 -0400.
© 2015 EMC Corporation. All rights reserved.