Blogs

  • Engineering Safe and Secure Software Systems

    by Ben Rothke on December 9, 2013

    At the beginning of chapter 3 of Engineering Safe and Secure Software Systems, author Warren Axelrod (full disclosure: Warren is a friend of mine) quotes two experts who observe that “software engineering is still an oxymoron” and “software engineering, as originally envisioned, does not yet exist”. With such a stipulation it would seem there is little value in writing (and reading) such a book. …

  • Information Security Governance Simplified: From the Boardroom to the Keyboard

    by Ben Rothke on December 2, 2013

    Juggling two balls is something that most people can do, but juggling six balls takes dexterity and practice. Juggling the complexities of current IT environments requires a significant amount of skill. Besides considerations of technical, business, and financial elements, there also are regulatory requirements for oversight and governance. In Information Security Governance Simplified: From the…

  • Four Trends Driving Cyber Security - Part 3

    by Todd Inskeep on December 2, 2013

    In our two previous blog posts, we explored two major trends facing the security industry today- the need for information security professionals to find their business voice and the overwhelming demand for skilled security personnel. A third major trend is the growing use of threat intelligence. Organizations are often starting or expanding their threat intelligence capabilities. These…

  • RSA Conference Amsterdam 2013 - Thank You!

    by Linda Gray on November 26, 2013

    Thank you for an amazing RSA Conference Europe! I would like to thank everyone who attended our recent event in Amsterdam. The turnout this year was our largest to date, and we’ve received great feedback from attendees. We’re extremely proud of this year’s speakers, session content and events. If you missed any of the action in Amsterdam be sure to check out our videos section for all of our…

  • Digital Outcasts: Moving Technology Forward without Leaving People Behind

    by Ben Rothke on November 25, 2013

    Many of us have experimented what it means to be disabled, by sitting in a wheelchair for a few minutes or putting a blindfold over our eyes. In Digital Outcasts: Moving Technology Forward without Leaving People Behind, author Kel Smith details the innumerable obstacles disabled people have to deal with in their attempts to use computers and the Internet. The book observes that while 1 in 7 people…

  • Four Trends Driving Cyber Security - Part 2

    by Todd Inskeep on November 19, 2013

    In our last blog post, we discussed the need for information security professionals to find their business voice. At the same time, security and risk management are driving the growing need for information security professionals. This leads to the second major trend facing the industry, which is the demand for skilled personnel. One CISO I know quotes unemployment in Information Security at less…

  • You know what time it is? Security Blogger Meetup and Awards!

    by Security Bloggers Meetup on November 18, 2013

    Ashimmy here folks, I know it is hard to believe, but it has been that long. It seems like just last week RSA Conference in San Fransisco was ending and we said we need to start planning next years Security Bloggers Meetup and Security Blogger Awards. But no it has been more than just a week or two. We are just 2 to 3 months away from RSA Conference 2014! Luckily the organizing committee of the…

  • FISMA Compliance Handbook

    by Ben Rothke on November 17, 2013

    If you work outside of the Federal Government space, you likely have not heard of FISMA. For the uninitiated, FISMA is the Federal Information Security Management Act. It was enacted in 2002 as part of the E-Government Act. It was a major impetus in the government regarding the importance of information security. After years of doing very little, FISMA was meant as a way to have a common security…

  • Four Trends Driving Cyber Security - Part 1

    by Todd Inskeep on November 12, 2013

    Cyber security has been changing constantly since before I started working at the National Security Agency in what is now the Information Assurance group. And while the underlying pressures, technology, and people have changed over time, the underlying need to protect information, and the principals of confidentiality, integrity and availability have remained the same. We do find ourselves in an…

  • RSA Conference Europe - Day 3 Highlights

    by Linda Gray on October 31, 2013

    I can't believe how quickly the 3 days of RSA Conference Europe came around. A big thanks to all the speakers, our sponsors and our delegates contributing to thought provoking and engaging discussions on subjects covering the most topical issues in information security and of course to the buzz on the show floor to what it certainly felt as the largest Europe Conference to date. The most…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 20 Apr 2014 01:42:41 -0400.
© 2014 EMC Corporation. All rights reserved.