Blogs

  • Dog Days of Summer Breed Innovative Speaking Submissions: Call for Speakers to Open Early September

    by Britta Glade on June 17, 2014

    Quick—I say summer, you say…..? Vacation? Beach? Relaxation? RSA Conference speaking submission? I’m pretty sure those are the first four thoughts that popped into your head, though perhaps not in that order. As you are hopefully well aware, RSA Conference will be held April 20-24 next year. This brings with it the promise of better weather as well as more time to prepare your speaking…

  • Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity,

    by Ben Rothke on June 16, 2014

    Having worked at the same consulting firm and also on a project with author J.J. Stapleton (yes, that was full disclosure); I knew he was a really smart guy. In Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity, Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptography, Stapleton has had his hand…

  • Tough Times for Security on the Internet of Things

    by John Linkous on June 16, 2014

    You've just returned home from a two-week Caribbean vacation. You're tanned, well-rested, and happy. You even got the bump to first class on your flight back home. Everything is great. As the plane lands and you turn on your smartphone, you connect to the "Internet of Things" via your home appliance app, to set the correct temperature in the house and turn on the outside lights. The funny thing…

  • Organizations Talk About Big Data More Than They Use It

    by Robert Moskowitz on June 13, 2014

    Lots of enterprise representatives are making claims about their movement into big data, but when you look behind the curtain, you can see they're moving at the rate of molasses. Here are some suggestions about why this may be the case, and how your organization can take steps to speed up the transition process: One reason may be that your organization has little idea of what it might do with so…

  • What's in Store: RSA Conference Asia Pacific and Japan 2014

    by Linda Gray on June 12, 2014

    RSA® Conference Asia Pacific & Japan 2014 kicks-off in just 6 weeks time, and we’re returning to the amazing Marina Bay Sands in Singapore for our second APJ Conference. We’re hoping to build on the momentum we saw in 2013 and welcome anywhere between 2,500 and 3,000 attendees over the course of the event. Like last year we have a packed programme. On the morning of Tuesday July 22 nd , Art…

  • Next-Gen Malware: Destructive Devices

    by Christopher Burgess on June 11, 2014

    The word malware (malicious or malevolent software) has permeated our lexicon, especially for those in the security world. A cyber-criminal's intent has been either to utilize your resources in their criminal endeavors (i.e., put their malware on your system and launch from within your hosted spaces) or to extract information from your entity that could be monetized quickly and effectively. At the…

  • Choose, but Choose Wisely: What Skills Does a CISO Really Need?

    by John Linkous on June 9, 2014

    The role of the CISO has shifted dramatically in the past ten years. Almost 20 years ago, in the early years of the information security officer role, the person who filled that position was focused on the very basics of security: antivirus, firewalls, and file system access control. At the time, there were no data security laws like HIPAA, no industry standards such as PCI or NERC, and no best…

  • A Tale of Two Cultures: Cool or Vigilant. Can the Security Industry Have Both?

    by Alex Bender on June 6, 2014

    We live in an age when a company’s “cool corporate culture” can actually come to influence them as a brand. Multi-billion dollar company Google offers an open, startup-like culture with an office layout that encourages spontaneous interactions. Earlier this year, the media was abuzz with the news that popular online shoe and clothing shop Zappos would transform itself from a traditional…

  • New Report Shows Retailers Slow to Make Use of Social Commerce Big Data

    by Robert Moskowitz on June 5, 2014

    The third annual Social Commerce IQ (SCIQ) report, based on survey results from 872 retailers regarding data from seven popular social platforms, shows that retailers have been slow to take advantage of the opportunities available to them in data from online consumers on brand awareness, traffic, and social CRM. The new report, prepared by social discovery pioneer 8thBridge, reflects the volume of…

  • Right-Sizing Information Risk for the Global Enterprise

    by John Linkous on June 4, 2014

    For many years, the most commonly accepted standard model of risk has been the verbatim formula (or a close variation of it): risk = [likelihood of threat] * [consequence of threat] * [asset value] This model is the foundation of most risk management activities; it was a topic in several RSA Conference 2014 sessions, including Malcolm Harkins' "Business Control and Velocity: Balance Security, …

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 22 Oct 2014 11:23:28 -0400.
© 2014 EMC Corporation. All rights reserved.