Blogs

  • Security Assessment From the Outside-In

    by David Wallace on March 20, 2014

    Outside-In security starts with realizing that your company or organization doesn't have all the answers. The Internet is a big place, and the World Wide Web is just one part of it. Connected mobile devices and appliances are expanding their reach every day, and with it, the complexity of a security assessment. Importance of Security Assessments Your people rely on personal devices and…

  • Protect Against Internal Data Security Threats: Specific Strategies and Techniques

    by Robert Moskowitz on March 18, 2014

    Everyone's worried about anonymous hackers, but the smartest IT Security teams also keep a sharp eye out for internal data security threats such as leaks from disgruntled employees, paid spies, or even trusted workers who are susceptible to human error. While you cannot guarantee total information security, at any price, there are some cost-effective strategies and techniques to cut down on the…

  • The Industrial Defender Acquisition: A Merging of National Security with Critical Infrastructure?

    by Gib Sorebo on March 17, 2014

    This last week, Industrial Defender announced that it had been acquired by Lockheed Martin for an unspecified amount. Brian Ahern and his team are to be congratulated on this apparently successful exit that they had been working towards for the last 12 years. Industrial Defender has long been the largest of the cybersecurity firms specializing in industrial control systems. It is a very fractured…

  • RFID: Connecting Users and Devices

    by Christopher Burgess on March 13, 2014

    Radio-frequency identification (RFID) chips are permeating our life at every level—at work, at home, and on the go. And while there is a important distinction between RFID and near field communications (NFC) chips, the premise is similar. For example, you may carry a dongle which opens your automobile door when it's within 20 feet of the vehicle. Whereas if you have a credit card from a European…

  • Threat Modeling: Designing for Security

    by Ben Rothke on March 3, 2014

    When it comes to measuring and communicating threats, the most ineffective example in recent memory was the Homeland Security Advisory System; which was a color-coded terrorism threat advisory scale. The system was rushed into use and its output of colors was not clear. What was the difference between levels such as high, guarded and elevated? From a threat perspective, which color was more severe -…

  • RSA Conference Day 5 Recap: THANK YOU

    by Alex Bender on February 28, 2014

    Thank you for another exciting RSA Conference! It is hard to believe that a full week has passed us by. Our 23 rd annual event was by far our most successful and we can’t thank you, our community enough for your dedication and involvement. This year a record number of more than 28, 500 attendees experienced approximately 419 sessions, keynotes, peer-to-peer sessions, track sessions, tutorials and…

  • The Best New Books from RSA Conference 2014

    by Ben Rothke on February 27, 2014

    There are a plethora of new books at the RSA conference book store. Here is my pick of the best of them, which I will be reading over the course of the next few months: Threat Modeling: Designing for Security - Adam Shostack Data-Driven Security: Analysis, Visualization and Dashboards - Jay Jacobs and Bob Rudis How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code -…

  • New Legislation Addresses Mobile App Privacy in California

    by Stephen Wu on February 27, 2014

    The healthcare field is beginning to hop onto the bandwagon of mobile computing. Mobile computing is spreading to healthcare in a number of ways. The first use case is in diagnostics, in which a doctor or nurse could use a device to monitor health metrics, such as vital signs (whether at hospital stays or simply during a routine check-up), glucose levels for diabetics, sleep data, caloric or…

  • Official RSA Conference 2014 Playlist

    by Ally Lorentson Dunn on February 27, 2014

    Wondering where you can find a list of the awesome songs you've been hearing at RSA Conference this week? Look no further! We've compiled a Spotify playlist of the songs you've heard in the Viewing Point and the Esplanade Ballroom. There's a little something for everyone - a handful of classics, the latest pop hits, and the hippest indie tracks. If you're like me and need a little boost to get you…

  • RSA Conference Day 4 Recap

    by Alex Bender on February 27, 2014

    Despite having very long days and trying to absorb hours upon hours of information, I continue to be amazed by the energy and excitement our attendees bring to Moscone each day. You have treated each day as if we were kicking off a brand new conference – and we appreciate it! The expo floors have been electric and the topics I keep hearing from our attendees involve the value and importance of…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 24 Jul 2014 15:18:05 -0400.
© 2014 EMC Corporation. All rights reserved.