Menu

Blogs

  • Intelligence-Driven Security and the Future of Threat Detection

    by John Linkous on August 21, 2014

    For many years, signature-based detection was the hallmark of finding and eliminating security threats in the enterprise. While antivirus and similar products were successful against single-vector attacks, the fact is, we're seeing more and more major security breaches where traditional approaches to security no longer work. To address these new threats, intelligence-driven security is needed. …

  • The Journey of an RSA Conference Speaking Submission

    by Britta Glade on August 20, 2014

    When thinking about the process for RSA Conference speaking proposals, I remembered School House Rock’s “I’m Just a Bill.” You know the one—“Bill,” a cute rolled-up piece of paper is sitting on the steps of Capitol Hill. He teaches the curious kid about the process, the waits, the analysis, and the debates that take place as part of his journey to becoming a law. For those “curious kids on the…

  • Cybercrime and Effective Cyber Law Enforcement

    by Robert Moskowitz on August 19, 2014

    These days, it's rare to open a news source (print or digital) without finding a story about cybercrime. Cybercriminals are hacking into databases, stealing credit and debit card account numbers, compromising individuals' identities, and shutting down legitimate websites. These articles highlight how necessary cyber law enforcement has become.Although data security budgets keep climbing and…

  • Identity Management and the Cloud: It's Easier Than You Think

    by John Linkous on August 14, 2014

    How do you create an identity management cloud? Identity management (IDM) has in the past hovered on the periphery of information security. No longer. As organizations become more aware of the risks of not keeping track of users, what they access, and what privileges they have, identity management is moving to the forefront. And identity management is not just limited to the largest enterprises, …

  • Security Metrics: How Are You Measuring Security?

    by Joshua Marpet on August 12, 2014

    Do you have an information security practice? How do you measure its effectiveness? By the number of tickets generated? The number of viruses found and stamped out? Or by how quiet it is?—"If they don't bother me, they must be doing their job!" Have the security metrics guidelines changed in the last few years as infosec moved away from a helpdesk mentality, towards a penetration tester's…

  • Carry On: Sound Advice from Schneier on Security

    by Ben Rothke on August 11, 2014

    Bruce Schenier has been called an information security rock star. If that’s the case, then Carry On: Sound Advice from Schneier on Security is his greatest hits collection 2008-2013. The roughly 175 essays in the book represent a collection of articles Schneier wrote for this Crypto-Gram newsletter, his blog and other blogs, magazines, newspapers and other periodicals. Some of the articles, such…

  • No Easy Answer for In-App Data Security on Mobile Devices

    by John Linkous on August 7, 2014

    The proliferation of mobile devices—smartphones, tablets, convertibles, and more—is leading to a fundamental shift in how technology is used both for individuals and businesses. It's also leading to major problems for ensuring mobile security, especially inside of apps. App data is managed through Internet-connected, platform-specific programs for mobile devices, delivered through trusted app…

  • The Business of Security

    by Christopher Burgess on August 6, 2014

    Some of the most affable salespersons any of us have ever encountered are in the business of selling security. The business of security takes on many personas: technology, intelligence, awareness, knowledge, automation, hardware, software, legal, identity, BYOD, privacy, insider or outsider, risk and risk tolerance, and identity. At the recent RSA Conference 2014, many presentations touched one…

  • It's August; Let's Talk Budgets

    by Fahmida Y. Rashid on August 5, 2014

    The year's halfway mark has just passed, which for many information security professionals means it's time to think about the end of the year and plan for next year. This month, we will talk about what this halfway point means for current security initiatives and how they affect upcoming budget discussions. It's never too early to evaluate the status of existing projects and initiatives and to…

  • Charity: Water Updates RSA Conference on Growing Nepal Efforts

    by Linda Gray on August 4, 2014

    At this year’s RSA Conference in San Francisco, we joined the charity: water mission asking our attendees to participate in a Waterwalk. In exchange for their participation, RSA Conference vowed to make a donation that would help fund two water projects for schools in Nepal. Join me for a chat with charity: water Growth Associate, Makena Cunningham, as we check in on the progress. At this year’s RSA…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 21 Dec 2014 23:11:42 -0500.
© 2014 EMC Corporation. All rights reserved.