Blogs

  • Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency

    by Ben Rothke on March 31, 2014

    Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency is definitely not your typical information security title. Mix in a few parts reference, technical guide, rant, scary stories, comedy and myriad references to movies, and there you have this book. The full title of the book is actually Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true?…

  • How Metrics Dictate Survival of Security's Fittest

    by Katrina Rodzon on March 27, 2014

    Setting up and maintaining a security awareness program is almost identical to doing a research study. You start with a question or behavior, you create your study/manipulation, and you measure the results. Sometimes the results lead to the end of the experiment, many other times it leads to small or large manipulations and further experimentation. The same is true when setting up a security…

  • Secure Global Open Source Calling and Message Tools

    by David Wallace on March 25, 2014

    Risk versus reward? Open source versus packaged? Security or flexibility? All of these decisions matter deeply when considering personal safety for international travelers. Because today's cell phones send a signal beacon that identifies your location, network, and movement, companies are turning to more secure open source applications to protect phone conversations and hide the email trail in…

  • Security Assessment From the Outside-In

    by David Wallace on March 20, 2014

    Outside-In security starts with realizing that your company or organization doesn't have all the answers. The Internet is a big place, and the World Wide Web is just one part of it. Connected mobile devices and appliances are expanding their reach every day, and with it, the complexity of a security assessment. Importance of Security Assessments Your people rely on personal devices and…

  • Protect Against Internal Data Security Threats: Specific Strategies and Techniques

    by Robert Moskowitz on March 18, 2014

    Everyone's worried about anonymous hackers, but the smartest IT Security teams also keep a sharp eye out for internal data security threats such as leaks from disgruntled employees, paid spies, or even trusted workers who are susceptible to human error. While you cannot guarantee total information security, at any price, there are some cost-effective strategies and techniques to cut down on the…

  • The Industrial Defender Acquisition: A Merging of National Security with Critical Infrastructure?

    by Gib Sorebo on March 17, 2014

    This last week, Industrial Defender announced that it had been acquired by Lockheed Martin for an unspecified amount. Brian Ahern and his team are to be congratulated on this apparently successful exit that they had been working towards for the last 12 years. Industrial Defender has long been the largest of the cybersecurity firms specializing in industrial control systems. It is a very fractured…

  • RFID: Connecting Users and Devices

    by Christopher Burgess on March 13, 2014

    Radio-frequency identification (RFID) chips are permeating our life at every level—at work, at home, and on the go. And while there is a important distinction between RFID and near field communications (NFC) chips, the premise is similar. For example, you may carry a dongle which opens your automobile door when it's within 20 feet of the vehicle. Whereas if you have a credit card from a European…

  • Threat Modeling: Designing for Security

    by Ben Rothke on March 3, 2014

    When it comes to measuring and communicating threats, the most ineffective example in recent memory was the Homeland Security Advisory System; which was a color-coded terrorism threat advisory scale. The system was rushed into use and its output of colors was not clear. What was the difference between levels such as high, guarded and elevated? From a threat perspective, which color was more severe -…

  • RSA Conference Day 5 Recap: THANK YOU

    by Alex Bender on February 28, 2014

    Thank you for another exciting RSA Conference! It is hard to believe that a full week has passed us by. Our 23 rd annual event was by far our most successful and we can’t thank you, our community enough for your dedication and involvement. This year a record number of more than 28, 500 attendees experienced approximately 419 sessions, keynotes, peer-to-peer sessions, track sessions, tutorials and…

  • The Best New Books from RSA Conference 2014

    by Ben Rothke on February 27, 2014

    There are a plethora of new books at the RSA conference book store. Here is my pick of the best of them, which I will be reading over the course of the next few months: Threat Modeling: Designing for Security - Adam Shostack Data-Driven Security: Analysis, Visualization and Dashboards - Jay Jacobs and Bob Rudis How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code -…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 29 Jul 2014 12:47:50 -0400.
© 2014 EMC Corporation. All rights reserved.