Blogs

  • Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity,

    by Ben Rothke on June 16, 2014

    Having worked at the same consulting firm and also on a project with author J.J. Stapleton (yes, that was full disclosure); I knew he was a really smart guy. In Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity, Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptography, Stapleton has had his hand…

  • Organizations Talk About Big Data More Than They Use It

    by Robert Moskowitz on June 13, 2014

    Lots of enterprise representatives are making claims about their movement into big data, but when you look behind the curtain, you can see they're moving at the rate of molasses. Here are some suggestions about why this may be the case, and how your organization can take steps to speed up the transition process: One reason may be that your organization has little idea of what it might do with so…

  • What's in Store: RSA Conference Asia Pacific and Japan 2014

    by Linda Gray on June 12, 2014

    RSA® Conference Asia Pacific & Japan 2014 kicks-off in just 6 weeks time, and we’re returning to the amazing Marina Bay Sands in Singapore for our second APJ Conference. We’re hoping to build on the momentum we saw in 2013 and welcome anywhere between 2,500 and 3,000 attendees over the course of the event. Like last year we have a packed programme. On the morning of Tuesday July 22 nd , Art…

  • Next-Gen Malware: Destructive Devices

    by Christopher Burgess on June 11, 2014

    The word malware (malicious or malevolent software) has permeated our lexicon, especially for those in the security world. A cyber-criminal's intent has been either to utilize your resources in their criminal endeavors (i.e., put their malware on your system and launch from within your hosted spaces) or to extract information from your entity that could be monetized quickly and effectively. At the…

  • Choose, but Choose Wisely: What Skills Does a CISO Really Need?

    by John Linkous on June 9, 2014

    The role of the CISO has shifted dramatically in the past ten years. Almost 20 years ago, in the early years of the information security officer role, the person who filled that position was focused on the very basics of security: antivirus, firewalls, and file system access control. At the time, there were no data security laws like HIPAA, no industry standards such as PCI or NERC, and no best…

  • A Tale of Two Cultures: Cool or Vigilant. Can the Security Industry Have Both?

    by Alex Bender on June 6, 2014

    We live in an age when a company’s “cool corporate culture” can actually come to influence them as a brand. Multi-billion dollar company Google offers an open, startup-like culture with an office layout that encourages spontaneous interactions. Earlier this year, the media was abuzz with the news that popular online shoe and clothing shop Zappos would transform itself from a traditional…

  • New Report Shows Retailers Slow to Make Use of Social Commerce Big Data

    by Robert Moskowitz on June 5, 2014

    The third annual Social Commerce IQ (SCIQ) report, based on survey results from 872 retailers regarding data from seven popular social platforms, shows that retailers have been slow to take advantage of the opportunities available to them in data from online consumers on brand awareness, traffic, and social CRM. The new report, prepared by social discovery pioneer 8thBridge, reflects the volume of…

  • Right-Sizing Information Risk for the Global Enterprise

    by John Linkous on June 4, 2014

    For many years, the most commonly accepted standard model of risk has been the verbatim formula (or a close variation of it): risk = [likelihood of threat] * [consequence of threat] * [asset value] This model is the foundation of most risk management activities; it was a topic in several RSA Conference 2014 sessions, including Malcolm Harkins' "Business Control and Velocity: Balance Security, …

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

  • Customer Data Cleanup in Aisle Four: Are You Helping YOUR Clients?

    by David Wallace on May 30, 2014

    If your personal data and credit account details were stolen recently, your choice is basically to get another card or start paying for things with cash. For companies, retaining clients means winning back trust. While banks, store chains, and credit card processors point fingers at each other, shoppers can only mop up the leak and hope there's no long-term harm to credit scores or financing. …

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 22 Sep 2014 22:17:35 -0400.
© 2014 EMC Corporation. All rights reserved.