Menu

Blogs

Showing Blog Posts: 1–10 of 189 tagged Cybersecurity

  • Securosis Guide: The Security Bonk

    by Securosis Team on March 31, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. For better or worse, a bunch of the Securosis team have become endurance athletes. Probably more an indication of age impacting our explosiveness, and constant travel impacting our respective waistlines, than anything…

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

    by Ben Rothke on March 30, 2015

    Technology is neutral and non-moral. It’s the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit…

  • Smashing the Binary

    by Wendy Nather on March 16, 2015

    One big problem in security is the tendency to think in binary terms. Either you’re breached or you’re not; either you’re secure or you’re not. But this black-and-white worldview can be the cause of both technology and people problems. Is it possible to be a “little bit pwned”? Most would say no, although if you’re used to dealing with a wide spectrum of incidents within an organization, you know…

  • The Seeds of Security

    by Wendy Nather on February 12, 2015

    My colleague Garrett Bekker once described the security industry as a pomegranate. It is brilliantly accurate: from the outside it looks like one piece, but when you open up the fruit, you see hundreds of little seeds, and it all makes a big mess (and leaves stains on everything you touch). Is the industry really this bad? Yes, it is. Consider that in our 451 Research master list, we have over…

  • Working With Government: Information Sharing Laws

    by Todd Inskeep on February 4, 2015

    This is the second post in a multi-part series. The first post is here. Information sharing is one major aspect of the current calls for action on National Cyber Security issues. As I noted earlier, lawers, company executives, government officials and others have differing views on the need for new laws regarding information sharing. Information sharing has been discussed in the context of the…

  • The Practical Guide to HIPAA Privacy and Security Compliance

    by Ben Rothke on January 25, 2015

    From an information security perspective, there is nothing overly onerous with the HIPAA security and privacy requirements. But like all regulations, the devil is in the details. While HIPAA is meant to protect large-scale disclosure of patient data, some of it includes absurd requirements such as ensuring white-boards in hospital wards don’t have full patient information and that intravenous…

  • State of the Union Puts Cybersecurity on National Agenda

    by Fahmida Y. Rashid on January 21, 2015

    Buried among the slew of national issues such as equal pay, immigration reform, climate change and Ebola, President Barack Obama spent a few seconds talking about net neutrality and cybersecurity in his State of the Union speech Tuesday evening. While it's nice to see security on the general agenda, it's still too early to know the government's plans. The full paragraph from the State of the Union…

  • Blackhat Movie Shows Viewers What Cyber-Attacks Look Like

    by Fahmida Y. Rashid on January 19, 2015

    Cybercrime is practically on the news every day—infected computers looting individual bank accounts, distributed denial-of-service attacks, hacked social media accounts, and data breaches. So clearly the time is right for a movie about hacking, right? There are plenty of reviews already for Michael Mann’s latest action thriller Blackhat, so there is no need to repeat what they say here, here, and …

  • Cyber Crime and Cyber Terrorism Investigator's Handbook

    by Ben Rothke on January 5, 2015

    While the perpetrator of the recent Sony hack is still to be determined, it was certainly an act of either cybercrime or cyberterrorism. With that, in Cyber Crime and Cyber Terrorism Investigator's Handbook, editors Babak Akhgar, Andrew Staniforth and Francesca Bosco have assembled a team of over 25 writers to give the reader an detailed overview of the topic. The authors and contributors are all…

  • Lockdown: Information Security Threats on the Edge of 2015

    by John Linkous on December 26, 2014

    As we look forward to 2015, this is a good time to take stock of how the information security threats and attack landscape have been changing. Let’s see: major data breaches at global, brand-name organizations, state-sponsored hacking activity, revelations of our own government's attempts to access personal data. It would be easy to proclaim 2014 as the "Year of the Security Threat," but that's…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 18 Apr 2015 19:34:34 -0400.
© 2015 EMC Corporation. All rights reserved.