Menu

Blogs

  • Securosis Guide: Security Management

    by Securosis Team on April 14, 2015

    Leading image

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Last year Big Data was all the rage at the RSAC in terms of security monitoring and management. So the big theme this year will be...(drum roll, please)...Big Data. Yes, it's more of the same, though we will see security big data called a bunch of different things—including insider threat detection, security…

  • Securosis Guide: Data Security

    by Securosis Team on April 13, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Data security is the toughest coverage area to write up this year. It reminds us of those bad apocalypse films, where everyone runs around building DIY tanks and improvising explosives to "save the children," before…

  • Who Steals a Child's Cell Phone?

    by Dale "Woody" Wooden on April 10, 2015

    Let me tell you a story about how social media can be used against you. Recently, I was on a trip for the weekend with my family. The final leg of this trip we stopped for a restroom break at a gas station in a small town called Robertsonville, NC. All of the kids got back in the vehicle and my daughter said she could not find her cell phone. We had not even pulled out yet. We did all the usual…

  • Securosis Guide: Identity and Access Management

    by Securosis Team on April 10, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. No Respect Identity is one of the more difficult topics to cover in our yearly RSAC Guide, because identity issues and trends don't grab headlines. Identity and Access Management vendors tend to be light-years ahead…

  • Securosis Guide: Cloud Security

    by Securosis Team on April 9, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Before delving into the world of cloud security we'd like to remind you of a little basic physics. Today's lesson is on velocity vs. acceleration. Velocity is how fast you are going, and acceleration is how fast…

  • Know Before You Go: Your Plan of Attack

    by Fahmida Y. Rashid on April 9, 2015

    There is no right or wrong way to approach RSA Conference. Everyone has a different approach when it comes to figuring out what sessions to view, which meetings to schedule, and which events to attend. Approach RSA Conference with specific questions in mind and plan who you will talk to in order to get the answers. Think about how you will follow-up for more information and when you will connect…

  • Asia is Technology's Newest Center of Innovation

    by Fahmida Y. Rashid on April 8, 2015

    Information security in Asia is on the cusp of tremendous change. Technology’s roots may be in Silicon Valley, but the center of innovation is shifting to Asia. The region leads the world in digital adoption and disruption. New technology is being taken, applied, developed, and rolled out, driving adoption across APJ and beyond. The balance of power is also changing. Asia is now home to more…

  • Statistics Done Wrong: The Woefully Complete Guide

    by Ben Rothke on April 8, 2015

    It’s unclear who really said that “there are three kinds of lies: lies, damned lies, and statistics”. But the reality is that statistics are often misunderstood and misused. In Statistics Done Wrong: The Woefully Complete Guide, author Alex Reinhart, a statistics instructor and PhD student at Carnegie Mellon University, makes the case that most people, even those in the sciences, are misusing…

  • Securosis Guide: Network Security

    by Securosis Team on April 8, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. We had a little trouble coming up with a novel and pithy backdrop for what you will see in the Network Security space at RSAC 2015. We wonder if this year we will see the first IoT firewall, because hacking…

  • Congrats to Everyone in Our First #RSAC Crowdsource Program, We Learned a Lot

    by Britta Glade on April 7, 2015

    The wait is over. We now have a slate of crowdsource sessions. Congratulations to everyone who participated in this inaugural program. We experimented with a new way of selecting educational sessions. We took a risk, and it was an exciting roller coaster ride. With a diverse—and vocal!—Program Committee by my side, we approached this experiment with the following tenets: Provide a lighter weight…

  • Securosis Guide: 2015 Endpoint Security Trends

    by Securosis Team on April 7, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. What you'll see at the RSAC in terms of endpoint security is really more of the same. Advanced attacks blah, mobile devices blah blah, AV-vendor hatred blah blah blah. Just a lot of blah... But we are still recovering…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 18 Apr 2015 15:26:54 -0400.
© 2015 EMC Corporation. All rights reserved.