Menu

Blogs

Showing Blog Posts: 11–20 of 49 tagged Business

  • Securosis Guide: Welcome to the Coverage Area Deep Dives

    by Securosis Team on April 6, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. While everyone likes to talk about the "security market" or the "security industry," in practice security is more a collection of markets, tools, and practices all competing for our time, attention, and dollars. Here…

  • Loose Lips Sink Ships, Part 2

    by Dale "Woody" Wooden on March 26, 2015

    Dale "Woody" Wooden illustrates security concepts through stories. His past posts discussed how attackers mine employees' social media accounts for information. This story picks up where we left off last time. If you read my last post, you already know our four travelers from Company X. They all used social media to discuss the trip to London they went on for the company. A hacking organization…

  • Measures and Metrics in Corporate Security

    by Ben Rothke on March 18, 2015

    Two of the most famous quotes from Lord Kelvin are “to measure is to know” and “if you can not measure it, you can not improve it”. With that, in Measures and Metrics in Corporate Security, author George Campbell provides a quick and high-level introduction to the topic of metrics and measurement. Campbell is the former Chief Security Officer at Fidelity Investments, where metrics are used…

  • Smashing the Binary

    by Wendy Nather on March 16, 2015

    One big problem in security is the tendency to think in binary terms. Either you’re breached or you’re not; either you’re secure or you’re not. But this black-and-white worldview can be the cause of both technology and people problems. Is it possible to be a “little bit pwned”? Most would say no, although if you’re used to dealing with a wide spectrum of incidents within an organization, you know…

  • Catching Up With Innovation Sandbox Winners: RedOwl Analytics

    by Fahmida Y. Rashid on February 23, 2015

    For 10 years RSA Conference has highlighted companies with innovative information security products as part of its Innovation Sandbox Contest. Who will we see competing this year? Ten companies go head-to-head on the Innovation Sandbox stage at RSA Conference to nab the "Most Innovative Company at RSA Conference" title. Teams from each company present and demonstrate their product in front of a…

  • The Seeds of Security

    by Wendy Nather on February 12, 2015

    My colleague Garrett Bekker once described the security industry as a pomegranate. It is brilliantly accurate: from the outside it looks like one piece, but when you open up the fruit, you see hundreds of little seeds, and it all makes a big mess (and leaves stains on everything you touch). Is the industry really this bad? Yes, it is. Consider that in our 451 Research master list, we have over…

  • The Hacker as an Administrator

    by Marc Maiffret on February 10, 2015

    In many data breaches, your IT team or someone else with the right privileges has been co-opted. By the time an attacker is lifting data from your servers, they are no longer hacking but simply using stolen user credentials and passwords. And in many of those instances, the way they are moving through your environment is not via any custom tools, but by taking advantage of administrative features…

  • Catching Up With Innovation Sandbox Winners: Appthority

    by Fahmida Y. Rashid on February 9, 2015

    For 10 years, RSA Conference has highlighted companies with innovation information security products as part of its Innovation Sandbox Contest. Who will we see this year? Every year, 10 companies go head-to-head on the Innovation Sandbox stage at RSA Conference to nab the "Most Innovative Company at RSA Conference" title. Teams from each company present and demonstrate their product in front of a…

  • Catching Up With Innovation Sandbox Winners: Invincea

    by Fahmida Y. Rashid on February 5, 2015

    RSA Conference is looking for companies innovating in information security. Is that you? Every year, RSA Conference showcases 10 companies with innovative information security products as part of its Innovation Sandbox Contest. RSA Conference 2015 marks the tenth year of the competition, and to mark that milestone, we asked past winners how they've fared over the past few years. During Innovation…

  • Loose Lips Sink Ships (And Profit Margins!)

    by Dale "Woody" Wooden on January 27, 2015

    Dale "Woody" Wooden illustrates security concepts through stories. This story looks at how attackers monitor employee social media accounts. There is also a Part 2. One of the largest threats facing any corporation is the leak of critical information and the ease at which it can be monitored by criminals and terrorists. Few organizations properly train their employees how to protect themselves at…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 24 May 2015 17:23:35 -0400.
© 2015 EMC Corporation. All rights reserved.