Menu

Blogs

Showing Blog Posts: 11–20 of 164 tagged Enterprise Defense

  • Building a Security Plan from Scratch: Kodak Alaris

    by David Needle on March 16, 2016

    Companies don’t often have the luxury of starting over when it comes to security, because there is usually legacy infrastructure to consider. As companies consider a move to the cloud, they're getting more flexibility, but even that typically takes a hybrid approach, moving some operations gradually off-premises while still keeping considerable infrastructure on-premises. Kodak Alaris, however, …

  • CISOs Share Tales From the Trenches at RSA Conference 2016

    by Tony Kontzer on March 3, 2016

    There are many themes that stretch across the information security world, but most organizations face their own particular challenges that require customized approaches. This was the clear takeaway from a well-attended panel at the RSA Conference Thursday, Lessons Learned from Real-World CISOs, during which CISOs from the medical device, education, health insurance and consumer goods sectors…

  • Securosis Guide: Attack of the (Analytics) Clones

    by Securosis Team on February 19, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Opening Crawl... "There is unrest in IT security. Thousand of malicious events pass undetected each day, and have overwhelmed the limited capabilities of SIEM to protect the enterprise. These attackers and rogue…

  • Achieving Digital Trust: The New Rules for Business at the Speed of Light

    by Ben Rothke on February 16, 2016

    In the first chapter of Achieving Digital Trust: The New Rules for Business at the Speed of Light, (Original Thought Press 978-0996599009), author Jeffrey Ritter writes how he presented his book to numerous publishing houses, to which all of them rejected his manuscript. Some noted that the book did not fit neatly into a specific editorial area. And therein lies the challenge with digital trust;…

  • Securosis Guide: The Beginning of the End(point) for the Empire

    by Securosis Team on February 15, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. For as long as we can remember, computer devices have been “protected” by the Evil Empire of Endpoint Protection. This Empire is made up of many companies that all rely on the same technology, deploying their agents…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

  • Cybercrime and Threats Are Growing in 2016

    by RSAC Contributor on January 21, 2016

    This post in our VC-series comes from Alberto Yépez and Don Dixon, managing directors of Trident Capital Cybersecurity. It’s a new year, and we are poised again for another round of malicious, often successful cyberattacks, many of which will draw upon ever more sophisticated technology. And some of which will be surprisingly deceptive. Take, for example, so-called “onion-layered” security…

  • Death to Shelfware: 5 Steps for Buying the Security You Actually Need

    by RSAC Contributor on January 4, 2016

    At a time when the industry is urging for increased investment in security, we’re also seeing plenty of security products gathering dust. Efforts to do more are not bringing the expected results, mainly because there is a rush to solve the problem, and not enough time spent understanding how various threats fit together. Consider the five-step program below to improve the likelihood that the…

  • Year in Review: Your Favorite Stories of 2015

    by Jennifer Lawinski on December 30, 2015

    The end of the year is always a time for reflection, and as we start thinking about our New Year's Resolutions, it can be helpful to take a look at what we learned the year before--or at least in what we liked reading. Last year you were interested in a wide variety of topics including books on cybersecurity, methods of attack and learning more about the RSA Conference. What were your favorite…

  • The CISO's End-of-Year Questionnaire: How Do You Show Security Success

    by RSAC Contributor on December 28, 2015

    With the end-of-the-year looming, CSOs/CISOs have to update the Board of Directors on how the company fared security-wise over the past year. Todd Feinman, CEO and founder of data management company Identity Finder, provides a checklist to guide that conversation. How do CSOs show security successes? The end of year boardroom discussion will focus primarily on 5 principal questions: 1. Were there…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 05 May 2016 12:11:07 -0400.
© 2016 EMC Corporation. All rights reserved.