Menu

Blogs

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 4: We Echo That Sentiment

    by Wade Baker on March 29, 2016

    Well, the 2016 RSA Conference is over. From my perspective, it was one of the most enjoyable RSACs ever. I had the good fortune to speak several times, participate in a StoryCorps project, do an interview with ISMG, meet with partners, customers, and friends, and even squeeze in a few sessions when my schedule allowed. I trust you’ve fully recovered by now and are busily exploring and implementing…

  • The Car Hacker's Handbook: A Guide for the Penetration Tester

    by Ben Rothke on March 26, 2016

    The history of technology is replete with instances of security researchers finding a flaw in a product. The vendors then discount the issue and mock the findings; saying it’s only a theoretical vulnerability. They may even resort to suing the researchers. When the vulnerability becomes widespread, these vendors then run to patch their insecure product. We are in that situation now with…

  • Weekend Reading: Verizon Breached, Cloud Threats and More

    by Jennifer Lawinski on March 25, 2016

    We know your work days are so busy that many of the week's best cybersecurity stories often get lost in the shuffle. That's where Weekend Reading comes in. Each Friday, we'll bring you the best news and analysis from the cybersecurity world to help you stay on top of industry issues. This week's big cybersecurity news comes from security journalist Brian Krebs, who broke the news this week that …

  • An Investor’s View of the RSA Conference

    by David Needle on March 23, 2016

    The RSA Conference in San Francisco wrapped up earlier this month, and there has been much discussion and analysis of the new products and services that were on display in addition to the many thought-provoking sessions. After spending a week among the crowds, I was very interested to get an investor’s perspective on the conference. It’s fascinating because investors can have a very bottom-line, …

  • Defense in Depth Is Necessary, But Not Sufficient: Five Best Practices for Managing and Controlling Third-Party Risk

    by RSAC Contributor on March 22, 2016

    This post was written by Mordecai Rosen, ‎General Manager, Security, CA Technologies. If data breaches such as those experienced by Home Depot, Target and Anthem taught us anything, it is that defense in depth needs a boost to include defense in breadth. Nearly two-thirds of companies extensively or significantly use third-party solutions in their organizations. Relying on a partner’s security and…

  • Cybersecurity Preparedness: Tips from a Veteran Security Journalist

    by David Needle on March 21, 2016

    To conclude my three-part series on security planning, I chatted with Sean Michael Kerner, a highly regarded security reporter for eWeek (and a former colleague). Sean had some interesting things to say about preparing for the year ahead—and good security practices in general. There are always going to be new security solutions to address the latest threats that Kerner says are worth looking at, …

  • The Cybersecurity Act of 2015 Is a Necessary Stake in the Ground

    by Robert Ackerman Jr. on March 18, 2016

    The Cybersecurity Act of 2015 is approaching its three-month birthday, but you can be excused if you’re oblivious to that. After all, many people probably don’t know it even exists. Very quietly, the law—the first major piece of Congressional cybersecurity legislation, one designed to address the explosive growth of successful cyberattacks—was signed into law in mid-December 2015 by President…

  • Why Cybersecurity Information Sharing Is Important

    by Rook Security on March 17, 2016

    By Tom Gorup The more information, the better. Right? In most cases, that is the truth. However, the way in which information is shared makes all the difference. Companies don’t share cybersecurity information because they fear attacker retribution and legal recourse. They don’t want to cause further retaliation from an attacker or show so much transparency that they could possibly cause the…

  • Building a Security Plan from Scratch: Kodak Alaris

    by David Needle on March 16, 2016

    Companies don’t often have the luxury of starting over when it comes to security, because there is usually legacy infrastructure to consider. As companies consider a move to the cloud, they're getting more flexibility, but even that typically takes a hybrid approach, moving some operations gradually off-premises while still keeping considerable infrastructure on-premises. Kodak Alaris, however, …

  • Ransomware Goes Corporate in 2016

    by RSAC Contributor on March 15, 2016

    This post comes from Liviu Arsene, security analyst at Bitdefender. The ransomware threat is growing. More than 13.1 million U.S. users—4.1 percent of the total population—have encountered ransomware, and half of them paid the ransom to recover their personal data. Another 40 percent would actually consider paying, according to a recent study we commissioned. In our security predictions for 2016, …

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 29 Apr 2016 17:40:45 -0400.
© 2016 EMC Corporation. All rights reserved.