Blogs

  • Welcome to RSA Conference Asia Pacific & Japan 2014!

    by Linda Gray on July 20, 2014

    We are very excited to welcome you to the second annual RSA ® Conference Asia Pacific & Japan 2014 being held in Singapore at the Marina Bay Sands! As you know, the event is taking place this Tuesday and Wednesday (22- 23 July), with a pre-Conference day beginning today, 21 st July. To help you navigate the conference and ensure you have an enjoyable experience, please review the important…

  • Supply Chain Security: What It Means on a Global Level

    by John Linkous on July 18, 2014

    Take a good, long look at your smartphone. While there is a big vendor name on the outside, if you were to open up its case, you would find several other vendor labels on various components: capacitive touchscreens; video and audio ASICs; Bluetooth and WiFi hardware; and individual capacitors, resistors, and other electronics gear building blocks, to name just a few, all of which are manufactured…

  • Incident Response: Is the House Really on Fire?

    by Christopher Burgess on July 16, 2014

    The comparison of incident response teams to fire departments has been around for many years, with well-funded entities within enterprises likened to professional fire departments in a large city and the less-funded teams within small-medium businesses (SMBs) likened to volunteer fire departments found in smaller communities. The difference between the well-funded and volunteer teams can be…

  • The Challenge of Mobile Forensics

    by John Linkous on July 14, 2014

    At RSA Conference 2014 in San Francisco, Andrew Hoog and the viaForensics, Inc., team presented "Mobile Analysis Kung Fu, Santoku Style." A highly informative presentation, Andrew and a viaForensics engineer, Sebastian Selma, gave a thorough overview of the mobile device security black art of forensics. While the practice of data forensics is difficult enough on a desktop or laptop computer, …

  • Government Security and InfoSec: Perfect Together?

    by Joshua Marpet on July 11, 2014

    Besides the white hat/black hat divide implicit within the world of InfoSec, there is another divide of mindsets—that of the corporate InfoSec individual and the government security individual. Their career paths are similar: They go to school, learn on the job, and hang out at conferences and user-group meetings. They decry the problems that software developers put in their paths and…

  • Risky Business: Changing Models for Information Risk Management

    by John Linkous on July 10, 2014

    For many years, information risk management (IRM) has been an evolving discipline. Never having been quite as advanced as financial or operational risk-modeling capabilities within the enterprise, IRM has often been relegated to a more esoteric, simplistic role in organizations. At this year's RSA Conference 2014 in San Francisco, however, the evolving—and improving—maturity of IRM in the…

  • Talking Security, Online - Continuing the Conversation

    by Fahmida Y. Rashid on July 9, 2014

    Information security professionals tend to be smart, savvy, and quite opinionated. They are the guardians, protecting the network and information. They are warriors, using whatever tools are at hand to fight threats. They have interesting stories, and it is my privilege to tell them. The experts in the field are many, including researchers, developers, administrators, managers, and executives, …

  • RSAC Family Continues to Grow: A Warm Welcome to Fahmida Y. Rashid!

    by Alex Bender on July 8, 2014

    As many within our community know, RSA Conference goes beyond just yearly events in the U.S., Europe and Asia Pacific and Japan. We strive to keep the conversations that begin at these events going throughout the year with programs like our webcasts, blogs, videos, podcasts and Twitter Chats. And you’re only going to see more of this as we expand our content strategy to engagement events like…

  • Data-Driven Security: Analysis, Visualization and Dashboards

    by Ben Rothke on July 7, 2014

    There is a not so fine line between data dashboards and other information displays that provide pretty but otherwise useless and unactionable information; and those that provide effective answers to key questions. Data-Driven Security: Analysis, Visualization and Dashboards is all about the later. In this extremely valuable book, authors and noted experts Jay Jacobs and Bob Rudis bring their…

  • When Culture and Security Collide

    by Alex Bender on July 7, 2014

    I talked about Security Protocols before it was cool: What happens when culture and security collide? On March 10, 2014, attendees of the music, film and interactive conference and festival South by Southwest (SXSW) crammed into two overflowing rooms for what many would later claim to be the most talked about event of the show. Former NSA contractor Edward Snowden addressed the SXSW audience via…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 22 Oct 2014 11:24:48 -0400.
© 2014 EMC Corporation. All rights reserved.