Menu

Blogs

  • You shared WHAT?! Employee File Sharing Risks and Strategies

    by Dave Butcher on February 25, 2014

    In year’s gone by, the majority of ad hoc file exchanges happened over email. But as file sizes continue to grow, email administrators are responding by imposing attachment size limitations on senders, recipients, or both. As a result, many employees are turning to cloud-based file-sharing tools to remain productive and share data ranging from presentations and medical images to loan…

  • RSA Conference Day 2 Recap

    by Alex Bender on February 25, 2014

    What an exciting start to RSA Conference 2014! It was fantastic to see so many of you yesterday for our welcome reception in the Expo Hall. I hope you all had as much fun as I did. Seeing so many familiar faces I felt like I was at a family reunion. The week kicked-off on Monday with the first annual International Cyber Leaders meeting and witnessed RedOwl crowned as “The Most Innovative…

  • Welcome to RSA Conference 2014!

    by Alex Bender on February 24, 2014

    After months of anticipation and buildup, RSA Conference 2014 kicks off today at San Francisco’s Moscone Center. Taking place February 24 to February 28, RSAC is bringing together the top information security professionals and business leaders from around the world to discuss emerging cybersecurity trends and formulate best strategies for tackling current and future cyber-threats. This year we…

  • On Social? Like Telling Time? We Have a Deal for You!

    by Linda Gray on February 21, 2014

    The RSA Conference community is one of the most active and vocal crowds in the IT world. Each year we see thousands of tweets, images, videos and more coming from our exhibitors on the show floor, our attendees heading to sessions and events and our speakers on stage. This year, we’d like to reward you for some of that creativity and social connections you already have in place. During RSA…

  • I am RSA Conference: Close Up

    by Alex Bender on February 20, 2014

    Every year RSA Conference looks to make an impact not only on the security industry, but on the day-to-day operations of our attendees and also their personal lives. This can only happen if the conference can provide compelling content that drives innovative thoughts that leaves you networking and asking questions of your peers, colleagues and friends while onsite. RSA Conference offers security…

  • A Critical Infrastructure Guide to the RSA Conference

    by Gib Sorebo on February 20, 2014

    Once again the RSA Conference is upon us, and we have a wealth of opportunities to learn, network, promote what we do, or just take a break from our normal rat race. For many of us, attending, though, next week will be a marathon of meetings, demonstrations, sessions, vendor parties, and shuttling in between. It’s an exhausting but usually beneficial endeavor. But there is a lot going on. For…

  • Expo Only Registration - A Wealth of Content

    by Jeanne Friedman on February 19, 2014

    Think your Explorer Expo Pass is only for cruising the Expo Hall? Think again. There is enough content at RSA Conference available to you to keep you occupied the entire week. Here is a basic overview of your content opportunities. Monday There are a variety of seminars offered by Associations that are free to all Expo pass holders. Demand is high for these sessions but just make sure you arrive…

  • The New Deal of Internet-Device Security

    by Mark Stanislav on February 18, 2014

    I once had a teacher who told me it had been years since he had enjoyed watching a movie. When I inquired as to why that was, he explained that because he had helped produce movies he couldn’t help but dissect every detail when watching one. Information security professionals have a similar plight when it comes to technology – we can’t help but peel back the layers and find the flaws in the…

  • Challenge Accepted – Giving Back to the Community

    by Alex Bender on February 18, 2014

    If you have been following my recent blog posts you know how closely tied I am to this year’s theme of Share. Learn. Secure. I believe this is more than just a slogan. It can evolve into a code of conduct we as a community should keep in mind. Given our profession, we can easily get lost in the “secure” term to only associate with the technology we touch, people we work with and processes we…

  • The “New” Cybersecurity Framework: Did They Get the Marketing Right This Time?

    by Gib Sorebo on February 17, 2014

    This last week, the Obama Administration announced the release of its Framework for Improving Critical Infrastructure Cybersecurity and instantly sought to distinguish this framework from the plethora of other government and industry-sponsored frameworks that seem to be more interested in who the guidance was intended to serve rather than the substance of the guidance. For example, the Department…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 28 Feb 2015 08:53:12 -0500.
© 2015 EMC Corporation. All rights reserved.