Blogs

  • Security Metrics You Should Be Watching for New Insights

    by David Wallace on June 30, 2014

    It's been more than 15 years since my identity, bank account, and credit history were taken hostage by some folks in the Bronx. By one set of security metrics, last year was a good year because there was no repeat failure. I've used "fraud alerts" on accounts to notify me in case of improper activity and been vigilant about credit reports and monitoring FICO scores, but I don't know if I'm any…

  • Cyber Crime, Security and Digital Intelligence

    by Ben Rothke on June 30, 2014

    Cyber Crime, Security and Digital Intelligence by Mark Johnson is a high-level introductory text to information security. The books 12 chapters cover the following topics: Threats to key sectors Cyber security fundamentals Cyber-attack fundamentals Organized cyber attacks Cloud risks Web 2.0 risks Cyber security threat actors Common vulnerabilities Cyber security control frameworks Cyber security…

  • Given a Choice, Users Still Prefer 'Classic' Graphical User Interfaces

    by Robert Moskowitz on June 27, 2014

    A survey of Linux users shows that attempts to improve upon early, well-designed user interfaces are falling flat on their faces. Users like what they have right now on their computer screens and don't want any so-called "improvements" that force them to do, among other things, more clicking. These early graphical user interfaces (GUIs) are not easily defined. However, they generally include a…

  • Blurring the Lines: How CISOs Become True Business Leaders

    by John Linkous on June 25, 2014

    It was interesting to note that this year's RSA Conference 2014 focused on the CISO leader, and how CISOs and other security professionals can expand their roles throughout the organization. The first full day of the conference included a half-day session discussing the many aspects of business that affect CISOs, from audits to understanding employee behavior and dealing with Boards of Directors. …

  • Intellectual Property at Risk

    by Christopher Burgess on June 23, 2014

    Walk about your office and ask your employees, "Are you appropriately protecting the company's intellectual property (IP)?" Count how many responses resemble, "Oh, I don't have access to any IP, I work in XYZ department, not R&D." Such answers cause cringes at every level, as it demonstrates multiple points of failure: failure to enlighten the workforce that IP involves so much more than just R&D…

  • Security Decisions: Changing the Way We Buy Security in the Enterprise

    by John Linkous on June 20, 2014

    When you hear the words "security product procurement," what's the first thing that pops into your head? Many enterprise customers who make security decisions for evaluating and purchasing technology often first think of the competitive landscape: How does one vendor's product compare to another? While this approach has been used since the dawn of commercial security products, there's a better…

  • BYOD: Security and Privacy

    by Christopher Burgess on June 18, 2014

    If your office has a BYOD (bring your own device) policy, your employees are connecting your ecosystem with their own devices, as are your partners with your intranet—and you may have little knowledge about these devices. The good news is that BYOD security and privacy implementation has a number of defined paths that can help you navigate through this jungle of privacy, security, and legal…

  • Dog Days of Summer Breed Innovative Speaking Submissions: Call for Speakers to Open Early September

    by Britta Glade on June 17, 2014

    Quick—I say summer, you say…..? Vacation? Beach? Relaxation? RSA Conference speaking submission? I’m pretty sure those are the first four thoughts that popped into your head, though perhaps not in that order. As you are hopefully well aware, RSA Conference will be held April 20-24 next year. This brings with it the promise of better weather as well as more time to prepare your speaking…

  • Tough Times for Security on the Internet of Things

    by John Linkous on June 16, 2014

    You've just returned home from a two-week Caribbean vacation. You're tanned, well-rested, and happy. You even got the bump to first class on your flight back home. Everything is great. As the plane lands and you turn on your smartphone, you connect to the "Internet of Things" via your home appliance app, to set the correct temperature in the house and turn on the outside lights. The funny thing…

  • Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity,

    by Ben Rothke on June 16, 2014

    Having worked at the same consulting firm and also on a project with author J.J. Stapleton (yes, that was full disclosure); I knew he was a really smart guy. In Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity, Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptography, Stapleton has had his hand…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 31 Oct 2014 02:59:46 -0400.
© 2014 EMC Corporation. All rights reserved.