• How Law Enforcement Agencies Fight Cyber Crime

    by Tony Kontzer on March 3, 2016

    Information security professionals have a plethora of technological tools at their disposal to fight would-be attackers—and more are on the way. The traditional prevention, detection and response technologies are soon to be augmented by innovative new tools that can do things such as spoof entire network topographies on the fly to deceive attackers. Yet a panel of federal law enforcement…

  • CISOs Share Tales From the Trenches at RSA Conference 2016

    by Tony Kontzer on March 3, 2016

    There are many themes that stretch across the information security world, but most organizations face their own particular challenges that require customized approaches. This was the clear takeaway from a well-attended panel at the RSA Conference Thursday, Lessons Learned from Real-World CISOs, during which CISOs from the medical device, education, health insurance and consumer goods sectors…

  • How a Security CEO Fell Prey to Scammers (Almost)

    by David Needle on March 3, 2016

    Having a security breach is one of every company’s worst nightmares. But the bad guys don’t just try to compromise your computer systems, they also use social manipulation and phony email addresses and domains to try and steal information and funds from right out from under your nose. That’s exactly what happened two years ago to Tom Kemp, CEO of cloud security firm Centrify. And the problem has…

  • Dispatches from the RSA Conference Expo Floor

    by Tony Kontzer on March 3, 2016

    I have trolled through many a conference exhibition hall in search of stories and swag for my kids, and there are always surprises waiting. I've played military "games," watched jugglers, and even had a conversation with a robot at past events. But I have never seen so many creative efforts at drawing eyeballs to a conference booth than at this year's RSA Conference in San Francisco. RSAC has…

  • Technology Takes a Backseat to Storytelling in StoryCorps Keynote

    by David Needle on March 3, 2016

    Dave Isay knows how to deliver bad news: Start with a compliment. “You are all working at a blistering pace to protect our lives,” Isay told the packed hall of security pros at the RSA Conference Wednesday afternoon. Then he added, “The next hour has nothing to do with cybersecurity.” You might think that would elicit groans at a security conference, but the crowd laughed and applauded with…

  • How Do Google, Microsoft and Adobe Think About Privacy?

    by Tony Kontzer on March 2, 2016

    You may have noticed that privacy has become sort of a big deal of late. From Apple's battle with the FBI to ongoing work on developing an international privacy regulation, privacy issues have taken center stage, right next to the plethora of security challenges companies face. At the RSA Conference on Tuesday, a panel of privacy executives from Microsoft, Google and Adobe took on the topic, and…

  • How Hacker High School is Training the Tech Pros of Tomorrow

    by David Needle on March 2, 2016

    Hacking gets a bad rap. That’s the view of Pete Herzog, Managing Director of ISECOM, the non-profit Institute for Security and Open Methodologies, who spoke on attracting a new generation of cybersecurity professionals at the RSA Conference Wednesday. Herzog highlighted a series of high profile cyber break-ins reported in the news as attacks by hackers. For example, the headline “Man Hacks Monitor, …

  • Streamline the Cloud: How Companies Use Cloud Access Security Brokers

    by Tony Kontzer on March 2, 2016

    Growing numbers of information security executives are learning just how expansive their organizations' use of cloud computing are. And let's just say the findings are often shocking. With many companies unknowingly using thousands of cloud services, it's no wonder they're turning in larger numbers to cloud access security brokers. CASBs, as they're referred to, are essentially security…

  • Struggle to Retain Top Cybersecurity Talent Crosses Borders: A Panel Discussion

    by Tony Kontzer on March 2, 2016

    Security is hard, but it's even harder for government agencies than it is for private sector companies. Government entities generally hold more data, and are targeted more frequently as a result. They have less incentive to take risks and innovate. And they struggle to hold on to their best people. It was with that backdrop that three "Cyber Wisemen" were asked to share their thoughts about the…

  • Government in the Crossfire: The Challenge of Data Privacy

    by Tony Kontzer on March 2, 2016

    If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be…

This document was retrieved from on Sun, 01 May 2016 15:22:12 -0400.
© 2016 EMC Corporation. All rights reserved.