Menu

Blogs

  • The Future of Cybersecurity: A Conversation With Peter W. Singer

    by Jennifer Lawinski on January 11, 2016

    What is going to shape the cybersecurity landscape of the future? According to Peter W. Singer, an author and geopolitical strategist with the New America Foundation, there are many factors at play. He sat down with RSA Conference to talk about robots, encryption, the geopolitical landscape, and more in advance of his keynote, NextWar: The Future of Technology and Geopolitics, at the Innovation…

  • Today’s ‘Unbreakable’ Encryption Is Tomorrow’s Security Weakness

    by Tony Bradley on January 8, 2016

    We hear a lot about encryption as a magic silver bullet solution that will secure and protect our data. Businesses and consumers are directed to employ encryption wherever possible, and in the wake of any data breach one of the first questions that comes up—often from encryption vendors with a marketing agenda—is whether the compromised data was protected with encryption. Encryption evolves over…

  • Security and Innovation: A Conversation with RSA's Niloofar Razi Howe

    by Jennifer Lawinski on January 7, 2016

    Innovation and security go hand-in-hand, and no one knows that better than RSA’s Chief Strategy Officer Niloofar Razi Howe. As the RSA Conference team gets ready for the big event, and the Innovation Sandbox competition, in San Francisco this year, we sat down with Ms. Howe to talk about innovation, security and the unique role startups will play in helping drive the future of the InfoSec…

  • Encryption Made Simple for Lawyers

    by Ben Rothke on January 6, 2016

    The good thing about encryption is that it can make your data virtually impossible to be read by anyone except those you allow. The bad thing about encryption is that it’s relatively easy to do wrong. And in many cases, people have made configuration errors such that they have locked themselves out of their own data. In Encryption Made Simple for Lawyers (American Bar Association - 978-16342505…

  • 25 Years of Talking Security: The RSAC Advisory Board Reflects on the Milestone Anniversary

    by Sandra Toms on January 5, 2016

    In 1991, the first RSA Conference brought together cryptographers to share advancements in Internet security. Leading up to this year’s conference, members of our advisory board took some time to reflect on this milestone anniversary, the past 25 years of the security industry and how RSAC can continue to keep pace with the rapidly expanding cybersecurity world. “The Internet was really just a…

  • Death to Shelfware: 5 Steps for Buying the Security You Actually Need

    by RSAC Contributor on January 4, 2016

    At a time when the industry is urging for increased investment in security, we’re also seeing plenty of security products gathering dust. Efforts to do more are not bringing the expected results, mainly because there is a rush to solve the problem, and not enough time spent understanding how various threats fit together. Consider the five-step program below to improve the likelihood that the…

  • Year in Review: Your Favorite Stories of 2015

    by Jennifer Lawinski on December 30, 2015

    The end of the year is always a time for reflection, and as we start thinking about our New Year's Resolutions, it can be helpful to take a look at what we learned the year before--or at least in what we liked reading. Last year you were intersted in a wide variety of topics including books on cybersecurity, methods of attack and learning more about the RSA Conference. What were your favorite…

  • Vulnerabilities for OS X and iOS Take the Spotlight in 2015

    by RSAC Contributor on December 29, 2015

    This post comes from Liviu Arsene, security analyst at Bitdefender. The common belief that Apple’s OS X and iOS are not as prone to vulnerabilities and attacks as other popular operating systems has been put to the test in 2015. As OS X and iOS adoption increases in the enterprise segment—partly due to a new generation of “millennial” managers—attackers will likely target the two platforms more. …

  • The CISO's End-of-Year Questionnaire: How Do You Show Security Success

    by RSAC Contributor on December 28, 2015

    With the end-of-the-year looming, CSOs/CISOs have to update the Board of Directors on how the company fared security-wise over the past year. Todd Feinman, CEO and founder of data management company Identity Finder, provides a checklist to guide that conversation. How do CSOs show security successes? The end of year boardroom discussion will focus primarily on 5 principal questions: 1. Were there…

  • The Security Reading Room: The Best Information Security Books of 2015

    by Ben Rothke on December 23, 2015

    There were a lot of good information security books that came out in 2015, and many that were not worth reading. The following books stand out as the best, listed in no particular order: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World: Bruce Schneier could have justifiably written an angry diatribe full of vitriol against President Obama, his administration, and…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 06 Feb 2016 18:17:28 -0500.
© 2016 EMC Corporation. All rights reserved.