Menu

Blogs

Showing Blog Posts: 11–20 of 52 tagged Encryption

  • RSAC 2016 Keynote Speakers Talk Apple, Encryption and the FBI

    by Tony Kontzer on March 1, 2016

    It's official: The information security community is firmly behind Apple in its battle with the FBI over the fate of the infamous iPhone 5 belonging to one of the shooters in last year's terrorist attack in San Bernardino, Calif. A succession of keynote speakers Tuesday at the RSA Conference in San Francisco made their allegiances clear, agreeing with Apple's perspective that developing a…

  • Tips for Having a Great RSA Conference Experience

    by David Needle on February 27, 2016

    The RSA Conference 2016 starts off Monday and it’s a biggie. Last year over 33,000 attendees swarmed the three Moscone Center conference halls in San Francisco and don’t be surprised if that number is even bigger this year, the 25 th anniversary of the event that started so modestly in 1991 with a gathering of 60 cryptographers. So how do you make the best use of your time at the conference? Linda…

  • RSA Conference 2016: What Will Everyone Be Talking About?

    by Tony Kontzer on February 26, 2016

    Take it from a veteran of the past several RSA Conferences: If there's one thing attendees at next week's gathering in San Francisco can count on, it'll be a slew of reminders of how everything we hear relates to the current news cycle. Whether it's been analyzing the revelations surrounding whistle-blower Edward Snowden, going over the details of the huge Target data breach of 2013, or engaging…

  • Cybercrime and Threats Are Growing in 2016

    by RSAC Contributor on January 21, 2016

    This post in our VC-series comes from Alberto Yépez and Don Dixon, managing directors of Trident Capital Cybersecurity. It’s a new year, and we are poised again for another round of malicious, often successful cyberattacks, many of which will draw upon ever more sophisticated technology. And some of which will be surprisingly deceptive. Take, for example, so-called “onion-layered” security…

  • Encryption Rules Only Apply to Those Who Follow Them

    by Tony Bradley on January 18, 2016

    The world can be a dangerous place, and nations around the world must be vigilant to identify and prevent attacks from would-be terrorists. In the wake of recent terrorist attacks in Paris and in San Bernardino, Calif., there has been increased debate over the need for intelligence agencies to have some sort of back-door access to enable monitoring of encrypted data and communications. It’s an…

  • Weekend Reading: Microsoft Silverlight and the Internet of Things

    by Jennifer Lawinski on January 15, 2016

    We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the cybersecurity world, chosen by the field's best writers and editors. This week we take a look at Microsoft Silverlight, the Internet of Things and whether security metrics are actually doing you any…

  • Your Security Resolutions for 2016

    by Wendy Nather on January 14, 2016

    We start the New Year with the best of intentions. We're going to join an ISAC and work out every day; consume only healthy and organic data; clean out our overstuffed Hadoop clusters and get rid of that out-of-fashion data; and measure our performance to match our goals. Oh yes, and we're going to stay within the security budget. But making lifestyle changes is hard, especially in security, where …

  • The Future of Cybersecurity: A Conversation With Peter W. Singer

    by Jennifer Lawinski on January 11, 2016

    What is going to shape the cybersecurity landscape of the future? According to Peter W. Singer, an author and geopolitical strategist with the New America Foundation, there are many factors at play. He sat down with RSA Conference to talk about robots, encryption, the geopolitical landscape, and more in advance of his keynote, NextWar: The Future of Technology and Geopolitics, at the Innovation…

  • Today’s ‘Unbreakable’ Encryption Is Tomorrow’s Security Weakness

    by Tony Bradley on January 8, 2016

    We hear a lot about encryption as a magic silver bullet solution that will secure and protect our data. Businesses and consumers are directed to employ encryption wherever possible, and in the wake of any data breach one of the first questions that comes up—often from encryption vendors with a marketing agenda—is whether the compromised data was protected with encryption. Encryption evolves over…

  • Encryption Made Simple for Lawyers

    by Ben Rothke on January 6, 2016

    The good thing about encryption is that it can make your data virtually impossible to be read by anyone except those you allow. The bad thing about encryption is that it’s relatively easy to do wrong. And in many cases, people have made configuration errors such that they have locked themselves out of their own data. In Encryption Made Simple for Lawyers (American Bar Association - 978-16342505…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 04 May 2016 07:43:54 -0400.
© 2016 EMC Corporation. All rights reserved.