Blogs

  • Threat Modeling: Designing for Security

    by Ben Rothke on March 3, 2014

    When it comes to measuring and communicating threats, the most ineffective example in recent memory was the Homeland Security Advisory System; which was a color-coded terrorism threat advisory scale. The system was rushed into use and its output of colors was not clear. What was the difference between levels such as high, guarded and elevated? From a threat perspective, which color was more severe -…

  • RSA Conference Day 5 Recap: THANK YOU

    by Alex Bender on February 28, 2014

    Thank you for another exciting RSA Conference! It is hard to believe that a full week has passed us by. Our 23 rd annual event was by far our most successful and we can’t thank you, our community enough for your dedication and involvement. This year a record number of more than 28, 500 attendees experienced approximately 419 sessions, keynotes, peer-to-peer sessions, track sessions, tutorials and…

  • Official RSA Conference 2014 Playlist

    by Ally Lorentson Dunn on February 27, 2014

    Wondering where you can find a list of the awesome songs you've been hearing at RSA Conference this week? Look no further! We've compiled a Spotify playlist of the songs you've heard in the Viewing Point and the Esplanade Ballroom. There's a little something for everyone - a handful of classics, the latest pop hits, and the hippest indie tracks. If you're like me and need a little boost to get you…

  • RSA Conference Day 4 Recap

    by Alex Bender on February 27, 2014

    Despite having very long days and trying to absorb hours upon hours of information, I continue to be amazed by the energy and excitement our attendees bring to Moscone each day. You have treated each day as if we were kicking off a brand new conference – and we appreciate it! The expo floors have been electric and the topics I keep hearing from our attendees involve the value and importance of…

  • The Best New Books from RSA Conference 2014

    by Ben Rothke on February 27, 2014

    There are a plethora of new books at the RSA conference book store. Here is my pick of the best of them, which I will be reading over the course of the next few months: Threat Modeling: Designing for Security - Adam Shostack Data-Driven Security: Analysis, Visualization and Dashboards - Jay Jacobs and Bob Rudis How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code -…

  • New Legislation Addresses Mobile App Privacy in California

    by Stephen Wu on February 27, 2014

    The healthcare field is beginning to hop onto the bandwagon of mobile computing. Mobile computing is spreading to healthcare in a number of ways. The first use case is in diagnostics, in which a doctor or nurse could use a device to monitor health metrics, such as vital signs (whether at hospital stays or simply during a routine check-up), glucose levels for diabetics, sleep data, caloric or…

  • RSA Conference Day 3 Recap

    by Alex Bender on February 26, 2014

    Can you believe we’re mid-week already? Crazy how fast a week can go by when you’re having fun! I am completely energized by you – our attendees – each day I have seen you sharing and learning to better secure our world. More than anything else, this type of communication is what makes RSA Conference such a unique experience. After attending the RSAC speaker's cocktail reception on Tuesday night…

  • You shared WHAT?! Employee File Sharing Risks and Strategies

    by Dave Butcher on February 25, 2014

    In year’s gone by, the majority of ad hoc file exchanges happened over email. But as file sizes continue to grow, email administrators are responding by imposing attachment size limitations on senders, recipients, or both. As a result, many employees are turning to cloud-based file-sharing tools to remain productive and share data ranging from presentations and medical images to loan…

  • RSA Conference Day 2 Recap

    by Alex Bender on February 25, 2014

    What an exciting start to RSA Conference 2014! It was fantastic to see so many of you yesterday for our welcome reception in the Expo Hall. I hope you all had as much fun as I did. Seeing so many familiar faces I felt like I was at a family reunion. The week kicked-off on Monday with the first annual International Cyber Leaders meeting and witnessed RedOwl crowned as “The Most Innovative…

  • Welcome to RSA Conference 2014!

    by Alex Bender on February 24, 2014

    After months of anticipation and buildup, RSA Conference 2014 kicks off today at San Francisco’s Moscone Center. Taking place February 24 to February 28, RSAC is bringing together the top information security professionals and business leaders from around the world to discuss emerging cybersecurity trends and formulate best strategies for tackling current and future cyber-threats. This year we…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 24 Apr 2014 07:26:55 -0400.
© 2014 EMC Corporation. All rights reserved.