Menu

Blogs

Showing Blog Posts: 1–10 of 56 tagged Encryption

  • Intelligence, Privacy Will Be Hot Topics at RSA Conference APJ 2016

    by Britta Glade on June 16, 2016

    RSA Conference Asia Pacific & Japan 2016 promises to be incredibly valuable for our attendees this year. More details on our stellar agenda continue to be added almost daily with care being taken to assure our delegates get maximum value for the investment they are making to attend. We are particularly pleased to welcome many top-rated—we refer them to rock stars at RSA Conference!—speakers to the…

  • SHA-1 Anyone? Let's Hash It Out...

    by RSAC Contributor on May 26, 2016

    By Errol Lloyd, Principal / Technical Lead, Data Protection Engineering, Fidelity Technology Group The Peer2Peer discussion in SHA-1 Anyone? Let's Hash It Out... centered on the web's transition away from the SHA-1 hashing algorithm, used as a digital signature within digital certificates. To kick-off the session, I asked if anyone heard the SHA-1 news during the Cryptographers' Panel earlier that…

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s…

  • World Password Day 2016: How Do You Manage Your Passwords?

    by Jennifer Lawinski on May 5, 2016

    I recently signed up for the TSA Global Entry Pre-Check program, because as I'm going to be traveling for RSA Conference, I'll be spending quality time at JFK for more than just vacations. Why is this information I'm sharing with you on World Password Day 2016? Just two days after I created my account on the government's site, I was notified via email that there was a change in my application…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • Protecting Cloud Applications: A SaaS Point of View

    by RSAC Contributor on March 31, 2016

    By Venkat Rangan, CTO at Clari A lot has been written about cloud applications and what an organization needs to do to protect their information assets when moving their applications to the cloud. The Cloud Security Alliance in their The Notorious Nine Cloud Computing Threats summarizes the threats to an organization when they sign up for a SaaS application or engage with a SaaS provider, but very…

  • Weekend Reading: Verizon Breached, Cloud Threats and More

    by Jennifer Lawinski on March 25, 2016

    We know your work days are so busy that many of the week's best cybersecurity stories often get lost in the shuffle. That's where Weekend Reading comes in. Each Friday, we'll bring you the best news and analysis from the cybersecurity world to help you stay on top of industry issues. This week's big cybersecurity news comes from security journalist Brian Krebs, who broke the news this week that …

  • RSA Conference 2016: The Week in Review

    by Tony Kontzer on March 11, 2016

    I don't know about you, but I always find myself swept away by the momentum of a big event like the just-concluded RSA Conference, but when it ends, brother, do I get a conference hangover. For what seems like days after I return home, my brain is mush and I can fall asleep on a dime. If anyone in my house so much as whispered the term "information security" during those first days back, I'd cut…

  • The Mathematics of Various Entertaining Subjects: Research in Recreational Math

    by Ben Rothke on March 10, 2016

    Recreational mathematics as defined by Wikipedia is a term for mathematics carried out for recreation (entertainment) rather than as a strictly research and application-based professional activity, although it is not necessarily limited to being an endeavor for amateurs. It often involves mathematical puzzles and games. Perhaps the greatest proponent of recreational mathematics was Martin…

  • A Look Back at RSA Conference 2016

    by Jennifer Lawinski on March 9, 2016

    We came. We saw. We talked a lot about encryption. If you attended the RSA Conference in San Francisco last week, the odds are good you have an opinion on whether Apple should comply with the FBI’s request to unlock a terrorist’s iPhone. And if you didn’t come with an opinion of your own, there were plenty to be heard. Keynote speakers from the worlds of technology and government shared their…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 29 Jun 2016 01:26:23 -0400.
© 2016 EMC Corporation. All rights reserved.