Blogs

Showing Blog Posts: 11–20 of 56 tagged Risk Management

  • Secure Global Open Source Calling and Message Tools

    by David Wallace on March 25, 2014

    Risk versus reward? Open source versus packaged? Security or flexibility? All of these decisions matter deeply when considering personal safety for international travelers. Because today's cell phones send a signal beacon that identifies your location, network, and movement, companies are turning to more secure open source applications to protect phone conversations and hide the email trail in…

  • Threat Modeling: Designing for Security

    by Ben Rothke on March 3, 2014

    When it comes to measuring and communicating threats, the most ineffective example in recent memory was the Homeland Security Advisory System; which was a color-coded terrorism threat advisory scale. The system was rushed into use and its output of colors was not clear. What was the difference between levels such as high, guarded and elevated? From a threat perspective, which color was more severe -…

  • “Keeping Up with the Joneses” May Not Mean Keeping Up With Security

    by Gib Sorebo on February 3, 2014

    As a cybersecurity consultant, I’m often asked by customers how they compare with their peers in the industry. This can vary from requests for simply anecdotal comparisons of products used to a full-fledged benchmarking of their entire cybersecurity program. Either way, it’s clear that aligning practices and spending with peers is important to many, particularly among critical infrastructure…

  • Introduction to Computer Networks & Cybersecurity

    by Ben Rothke on January 2, 2014

    To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference. Today, nearly every piece of data that needs to be secured is in some way or another connected to a network. With that in mind, the book…

  • Four Trends Driving Cyber Security - Part 1

    by Todd Inskeep on November 12, 2013

    Cyber security has been changing constantly since before I started working at the National Security Agency in what is now the Information Assurance group. And while the underlying pressures, technology, and people have changed over time, the underlying need to protect information, and the principals of confidentiality, integrity and availability have remained the same. We do find ourselves in an…

  • The Perils of Audits

    by Gib Sorebo on August 31, 2013

    Among critical infrastructure asset owners, a common device for ensuring that their cybersecurity risk posture is appropriate is an audit. We'll leave aside whether the motivation is compliance or simply a desire to be as secure as possible against attacks. In essence, both motivations often lead to the disaster that is the audit whether it is driven by "best practices" or a particular compliance…

  • The Evolution of What We Value and How Much

    by Gib Sorebo on August 19, 2013

    In the current controversies involving what our intelligence community is collecting about its citizens, the issue has frequently been framed as a balance of protecting the personal safety of people versus protecting one’s privacy. While delving deeper may reveal a false dichotomy, we nonetheless must acknowledge that such tradeoffs do exist. At the very least, we’ve come to expect and accept…

  • The Chinese Information War

    by Ben Rothke on May 13, 2013

    Author Dennis Poindexter begins The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests with the observation that his book is about a war that many will doubt the US will have, an information war with China. In the months since the Mandiant APT1: Exposing One of China's Cyber Espionage Units report was released, I think the reality is…

  • Cybersecurity: Public Sector Threats and Responses

    by Ben Rothke on May 2, 2013

    One of the myriad benefits of the Internet has been the increase in efficiency and speed of communications. What used to take days and weeks to transmit can now be sent instantly with Facebook, e-mail, Twitter, and the like. In Cybersecurity: Public Sector Threats and Responses, author Kim Andreasson provides an over­view of how government agencies and other public-sector groups can use the…

  • The Death of the Internet - Markus Jakobsson

    by Ben Rothke on April 15, 2013

    When I first heard about the book The Death of the Internet, it had all the trappings of a second-rate book; a histrionic title and the fact that it had nearly 50 contributors. I have seen far too many books that are pasted together by myriad disparate authors, creating a jerry-rigged book with an ISBN, but little value or substance. The only negative thing about the book is the over the top…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 02 Sep 2014 02:50:48 -0400.
© 2014 EMC Corporation. All rights reserved.