Blogs

  • Taking the Torch

    by Britta Glade on April 28, 2014

    I’ve lived my life with a few core drivers – drivers instilled in me by my parents that I try to pass on to my children: shoot for the stars by exercising and challenging your brain, pursue a career that you will enjoy, and make a positive impact in the world. The intersection of these three drivers is narrow and aspirational, I know, but the underlying guidance has always been clear: you can—and…

  • Reflecting Back on RSA Conference Content and Looking Forward to its Bright Future

    by Alex Bender on April 25, 2014

    In 2014, over 500 staffers worked tirelessly to make RSA Conference a success. From building the expo hall to registering more than 28,500 attendees, the Conference is the culmination of months of planning, collaboration and teamwork. For all we put into the show, it can be a bit surreal to see how fast the Moscone Center is dismantled on Friday. While the banners, A/V and booths are temporary, …

  • Requirements for Encryption of Payment Card Data

    by Robert Moskowitz on April 24, 2014

    There are many specific criteria that must be met in order to comply with requirements for cardholder data encryption for credit and debit cards. The Payment Card Industry Data Security Standard (PCI DSS) provides specific security measures designed to protect cardholders—as well as merchants, processors, acquirers, issuers, and service providers (and others in the industry) from malicious…

  • Passing the torch!

    by Jeanne Friedman on April 23, 2014

    After 7 years it is time for me to move on and explore new directions. I have seen the Conference grow so much over these years in the number of attendees, speakers, tracks, sessions, types of content and more. My favorite part of the job as content manager was getting to know the speakers and working with the Program Committees all over the world. I am awed by the ability of professionals who…

  • Performance-Based Cybersecurity Objectives: Do They Really Exist?

    by Gib Sorebo on April 22, 2014

    After reading an excellent article by Ernie Hayden of Verizon that discusses the new Framework for Improving Critical Infrastructure Cybersecurity, a few things popped into my mind. While I’ve expressed my opinions on this framework and frameworks in general several times, I thought Ernie’s information could definitely be useful to small, unregulated businesses that he notes would benefit the most. …

  • Windows XP: The COBOL of the 21st Century

    by Joshua Marpet on April 21, 2014

    What happened when Windows XP went into end of life (EOL)? That fateful day happened on April 8, 2014. It doesn't mean that WinXP computers will suddenly stop working. It doesn't mean that the world of WinXP computing will end. To be honest, it probably doesn't even mean that WinXP-based programming will end. So what does it actually mean? New drivers won't be developed. It will get increasingly…

  • Privacy in the Age of Ubiquitous Computer Vision

    by Joshua Marpet on April 17, 2014

    With Google Glass, cell phone cameras, hidden cameras, and ever cheaper surveillance cameras, can there truly be user privacy? With Google Glass and facial recognition apps, tagging people can happen at full walking speed, without a pause or possibility of the action being recognized. Is there any parallel in other realms? At one point, a car with an expired registration would only get exposed…

  • New Threats, New Requirements: Time to Update Your Information Security Policies

    by John Linkous on April 15, 2014

    In the rapid scale of technology time, it's safe to say that we're no longer living in the world of your father's Internet. Of course, this has ramifications for Internet security: The rapid adoption of the mobile device as the primary interface for many users, the mass-scale outsourcing of infrastructure, services, and data to cloud providers, and the now-ubiquitous "Internet of Things" that…

  • The FTC v. Wyndham Decision: A New Era or More of the Same?

    by Gib Sorebo on April 14, 2014

    The recent decision of the Federal Trade Commission v. Wyndham Worldwide Corporation reflected, for the first time, a court’s view on the Federal Trade Commission’s (FTC’s) authority to regulate cybersecurity under the Federal Trade Commission Act. The court concluded that (1) the FTC does have the authority to regulate cybersecurity under its authority in Section 5 of the FTC Act to address…

  • Unmasking the Social Engineer: The Human Element of Security

    by Ben Rothke on April 13, 2014

    In his first book, Social Engineering: The Art of Human Hacking, author Christopher Hadnagy wrote the definitive book on social engineering. In it, he detailed the entire lifecycle of social engineering and pretty much everything you needed to know on the topic. In his just released follow-up Unmasking the Social Engineer: The Human Element of Security, he takes social engineering up a few levels. …

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 01 Sep 2014 03:37:47 -0400.
© 2014 EMC Corporation. All rights reserved.