Menu

Blogs

  • Social Media Security: Leveraging Social Networking While Mitigating Risk

    by Ben Rothke on February 3, 2015

    A firm can spend decades building a brand into one that inspires trust. Unfortunately, social media can quickly destroy that trust in an instant. In Social Media Security: Leveraging Social Networking While Mitigating Risk, author Michael Cross provides a comprehensive overview of the security and privacy risks around social media. The book lives up to its title and effectively shows the reader…

  • Changing the Security Conversation One Topic at a Time

    by Fahmida Y. Rashid on February 3, 2015

    Just two months into 2015, and there is already a theme in information security: let's talk. Let's talk within the organization, within the industry, with the government, with everyone else. It's not a new concept. The hallmark of a good security professional is one who can communicate effectively with end users, business stakeholders, and the board of directors. Information security…

  • Catching Up With Innovation Sandbox Winners: Sourcefire

    by Fahmida Y. Rashid on February 2, 2015

    The Innovation Sandbox Contest turns 10 this April! Every year, RSA Conference showcases 10 companies with innovative information security products on the market as part of its Innovation Sandbox Contest. Teams from each company present and demonstrate their product in front a panel of judges and answer questions. This year's winner will be named “Most Innovative Company at RSA Conference 2015.”…

  • Crowdsourced Submissions at RSA Conference is Open!

    by Fahmida Y. Rashid on January 29, 2015

    You can now submit your talk for Crowdsourced Submissions at RSA Conference! This is your chance to see if the idea you’ve been working on can be part of the RSA Conference program in April. RSA Conference introduced Crowdsourced Submissions as a new session type for this year's conference. There are a ton of great ideas and insights out there—the quality and quantity of submissions for the trad…

  • Network Security: Does Your Network Resemble a Sieve?

    by Christopher Burgess on January 29, 2015

    The new year is on the here and you're putting together the goals and objectives for your network security team. The number of data breaches during the past year have finally caught the attention of your company's board of directors and executive decision makers. Resources have always been tight, but this year there is an allocation to secure the company's networks. It would appear that the years…

  • Getting “Eyes on the Glass” for Critical Infrastructure

    by Gib Sorebo on January 29, 2015

    It’s sort of ironic that the sector with the most 24x7 control rooms, still struggles with monitoring for cyber attacks. However, the critical infrastructure sectors, for the most part, change slowly. And while they have always appreciated the need to monitor operations around the clock, those operations had been largely self-contained with limited exposure to outside networks. Consequently, …

  • Designing and Building a Security Operations Center

    by Ben Rothke on January 28, 2015

    Many organizations are overwhelmed by the onslaught of security data from disparate systems, platforms and applications. They have numerous point solutions (anti-virus, firewalls, IDS/IPS, ERP, access control, IdM, single sign-on, etc.) that can create millions of daily log messages. In addition to directed attacks becoming more frequent and sophisticated, there are regulatory compliance issues…

  • Data Privacy (or the Lack Thereof) in the Internet of Things

    by John Linkous on January 28, 2015

    At this year's Consumer Electronics Show (CES) in Las Vegas, new technologies ran the gamut from incremental changes for existing technologies to full-blown new market segments (here's looking at you, drones). While technologies such as drones and connected cars have significant implications for geo-positioning privacy and even kinetic threats, an even bigger threat comes from the impact they may…

  • Loose Lips Sink Ships (And Profit Margins!)

    by Dale "Woody" Wooden on January 27, 2015

    One of the largest threats facing any corporation is the leak of critical information and the ease at which it can be monitored by criminals and terrorists. Few organizations properly train their employees how to protect themselves at home, to stay safe while traveling, or to censor corporate information on social media. The first step in education is focusing on cyber-hygiene when traveling as…

  • PRAGMATIC Security Metrics - Applying Metametrics to Information Security

    by Ben Rothke on January 27, 2015

    Like all books on metrics, early in PRAGMATIC Security Metrics: Applying Metametrics to Information Security authors Krag Brotby and Gary Hinson state that “you can't manage what you can't measure”. The authors claim that other books on information security metrics discuss number theory and statistics in academic terms. This title promises to be light on mathematics and heavy on utility and is…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 27 Apr 2015 01:35:22 -0400.
© 2015 EMC Corporation. All rights reserved.