Blogs

  • Privacy Policy Developments and International Terror

    by Joshua Marpet on April 29, 2014

    Terrorism: The very word strikes fear into people. Even after over a decade of the "War on Terror," it's still frightening. What concrete outcomes have resulted from the war on terror today? It's been shown, studied, and proven that people are willing to give up privacy in order to get more security. Has this resulted in any day-to-day changes to the way the Internet works? Absolutely. Example? So…

  • Designing with the Mind in Mind, a Simple Guide to Understanding User Interface Design Guideline

    by Ben Rothke on April 28, 2014

    Neurologists and brain scientists are in agreement that in truth, we know very little about how the human brain works. In the just released second edition of Designing with the Mind in Mind, a Simple Guide to Understanding User Interface Design Guidelines, author and UI expert Jeff Johnson provides a fascinating introduction to the fundamentals of perceptual and cognitive psychology for…

  • Taking the Torch

    by Britta Glade on April 28, 2014

    I’ve lived my life with a few core drivers – drivers instilled in me by my parents that I try to pass on to my children: shoot for the stars by exercising and challenging your brain, pursue a career that you will enjoy, and make a positive impact in the world. The intersection of these three drivers is narrow and aspirational, I know, but the underlying guidance has always been clear: you can—and…

  • Reflecting Back on RSA Conference Content and Looking Forward to its Bright Future

    by Alex Bender on April 25, 2014

    In 2014, over 500 staffers worked tirelessly to make RSA Conference a success. From building the expo hall to registering more than 28,500 attendees, the Conference is the culmination of months of planning, collaboration and teamwork. For all we put into the show, it can be a bit surreal to see how fast the Moscone Center is dismantled on Friday. While the banners, A/V and booths are temporary, …

  • Requirements for Encryption of Payment Card Data

    by Robert Moskowitz on April 24, 2014

    There are many specific criteria that must be met in order to comply with requirements for cardholder data encryption for credit and debit cards. The Payment Card Industry Data Security Standard (PCI DSS) provides specific security measures designed to protect cardholders—as well as merchants, processors, acquirers, issuers, and service providers (and others in the industry) from malicious…

  • Passing the torch!

    by Jeanne Friedman on April 23, 2014

    After 7 years it is time for me to move on and explore new directions. I have seen the Conference grow so much over these years in the number of attendees, speakers, tracks, sessions, types of content and more. My favorite part of the job as content manager was getting to know the speakers and working with the Program Committees all over the world. I am awed by the ability of professionals who…

  • Performance-Based Cybersecurity Objectives: Do They Really Exist?

    by Gib Sorebo on April 22, 2014

    After reading an excellent article by Ernie Hayden of Verizon that discusses the new Framework for Improving Critical Infrastructure Cybersecurity, a few things popped into my mind. While I’ve expressed my opinions on this framework and frameworks in general several times, I thought Ernie’s information could definitely be useful to small, unregulated businesses that he notes would benefit the most. …

  • Windows XP: The COBOL of the 21st Century

    by Joshua Marpet on April 21, 2014

    What happened when Windows XP went into end of life (EOL)? That fateful day happened on April 8, 2014. It doesn't mean that WinXP computers will suddenly stop working. It doesn't mean that the world of WinXP computing will end. To be honest, it probably doesn't even mean that WinXP-based programming will end. So what does it actually mean? New drivers won't be developed. It will get increasingly…

  • Privacy in the Age of Ubiquitous Computer Vision

    by Joshua Marpet on April 17, 2014

    With Google Glass, cell phone cameras, hidden cameras, and ever cheaper surveillance cameras, can there truly be user privacy? With Google Glass and facial recognition apps, tagging people can happen at full walking speed, without a pause or possibility of the action being recognized. Is there any parallel in other realms? At one point, a car with an expired registration would only get exposed…

  • New Threats, New Requirements: Time to Update Your Information Security Policies

    by John Linkous on April 15, 2014

    In the rapid scale of technology time, it's safe to say that we're no longer living in the world of your father's Internet. Of course, this has ramifications for Internet security: The rapid adoption of the mobile device as the primary interface for many users, the mass-scale outsourcing of infrastructure, services, and data to cloud providers, and the now-ubiquitous "Internet of Things" that…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 02 Sep 2014 17:16:34 -0400.
© 2014 EMC Corporation. All rights reserved.