Blogs

  • Cloud Service Maturing in Southeast Asia

    by Christopher Burgess on May 12, 2014

    Cloud service adoption and build-out in Southeast Asia is not new, as evidenced by the rapid pace in which Thailand, Malaysia, and Singapore took key positions in the data center and cloud service provider categories in 2011. Indeed, in 2012, the Singapore government offered incentives to companies to adopt cloud computing, and according to the Singapore Economic Development Board, Singapore was…

  • Greatly Reduce Data Theft by Knowing the Who and Where of Your Data

    by Christopher Burgess on May 9, 2014

    The universal constant of every business, regardless of size or industry, is that it has important data, and that data may be the target for theft. What should be the second constant is knowledge of where the data is located. Once you know its location, you can sort out who has access. This sounds simple, yet so many companies are unable to say with certainty where their data is, who has access…

  • Data Classification: The Elephant in the File Server

    by Joshua Marpet on May 7, 2014

    You know the common thought process: "Data classification is a planning thing. It's an operations thing. It's a disaster-recovery thing. But it can't be this department's thing. Nope. Not doing it. It's too hard. Takes too long. Wastes manpower. Why is it done, anyway? Nobody cares about it." The amount of data created and collected every year is huge. Enough of it is generated every day to fill…

  • Introduction to Information Security: A Strategic-Based Approach

    by Ben Rothke on May 7, 2014

    Most introductory books about information security are about the size of this book, but are often written at a far too basic level. In Introduction to Information Security: A Strategic-Based Approach, authors Timothy Shimeall and Jonathan Spring of CERT are able to provide an exploratory text about the topic without getting bogged down in the more elementary items. The book provides a good balance…

  • BYOD Is Alive and Growing in APAC

    by Christopher Burgess on May 5, 2014

    Bring your own device (BYOD) adoption in APAC is alive and well, and is expected to increase by more than 20 percent from 2014 to 2020, according to a study by Grand View Research. Two driving factors for this growth are reduced hardware costs and the maturation of cloud-based solutions, and the devices of choice are smartphones and tablets. What's in it for the businesses? A report from…

  • The Cybersecurity Skills Gap: A Real or Manufactured Crisis?

    by Gib Sorebo on May 5, 2014

    Over the last few years, we’ve been bombarded with messages proclaiming a cybersecurity skills gap and associated statistics of positions going unfilled. For example, Cisco’s Annual Security Report estimated there were more than a million unfilled positions for security professionals world-wide. The Defense Department has said it plans to triple the number of “cyberwarriors” it employs by 2016 to…

  • When Intellectual Property Goes Out the Front Door

    by Christopher Burgess on May 1, 2014

    According to a 2012 survey by the Japanese Ministry of Economy, Trade, and Industry (METI) referenced in The Asahi Shimbun, it was revealed that of the 3,000 Japanese companies polled, 13.5 percent have had their intellectual property (IP) leaked or have suspected a leak over the past five years. The Asahi Shimbun goes on to describe how IP is being stolen by a variety of entities, both foreign and…

  • Webcast Q&A - Metrics: A How-To For The Success of Your Security Awareness Program

    by Ally Lorentson Dunn on April 29, 2014

    Last week we hosted a webcast with top rated speaker Katrina Rodzon. We had a great audience who sent in more questions than we had time to answer during the session. The questions that we could not get to on the live event are below with Katrina's responses. Jump over to our video page for the full replay of the session and the questions that were answered live. Question Answer How do you quantify…

  • Privacy Policy Developments and International Terror

    by Joshua Marpet on April 29, 2014

    Terrorism: The very word strikes fear into people. Even after over a decade of the "War on Terror," it's still frightening. What concrete outcomes have resulted from the war on terror today? It's been shown, studied, and proven that people are willing to give up privacy in order to get more security. Has this resulted in any day-to-day changes to the way the Internet works? Absolutely. Example? So…

  • Taking the Torch

    by Britta Glade on April 28, 2014

    I’ve lived my life with a few core drivers – drivers instilled in me by my parents that I try to pass on to my children: shoot for the stars by exercising and challenging your brain, pursue a career that you will enjoy, and make a positive impact in the world. The intersection of these three drivers is narrow and aspirational, I know, but the underlying guidance has always been clear: you can—and…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 24 Jul 2014 12:58:04 -0400.
© 2014 EMC Corporation. All rights reserved.