Menu

Blogs

Showing Blog Posts: 1–10 of 202 tagged Cybersecurity

  • Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

    by Ben Rothke on June 10, 2015

    An extremely important piece of advice in Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan is on page 85, where authors Jeff Bollinger, Brandon Enright and Matthew Valites write that you will need at least one dedicated and full-time person to analyze your security event data. When creating programs for information security monitoring and its corresponding…

  • RSAC Unplugged, A Visual Retrospective

    by Fahmida Y. Rashid on June 9, 2015

    At RSA Conference, we like to experiment and try out new things. We tried crowd-sourcing some sessions for RSA Conference 2015. We are having year-round conversations through blog posts and webcasts. With RSAC Unplugged, we put 120 people in one room with excellent speakers and waited to see what would happen. We took away the exhibit hall and the sales pitches, consolidated all the tracks into…

  • Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

    by Ben Rothke on June 1, 2015

    Any organization that has a sizeable web presence, especially if it involves e-commerce, will inevitably become a victim of some sort of Internet malfeasance. Contrary to popular management belief, knowing how to effectively deal with, respond to, and recover from such incidents is not a trivial endeavor. Nothing proved that more than the Sony breach of 2014. In Investigating Internet Crimes: An…

  • The Human Element of Computer Security

    by Robert Moskowitz on May 25, 2015

    Most organizations spend significant sums on high-tech defenses such as firewalls, anti-virus software, intrusion detection systems, and biometric locking devices as part of their computer security efforts. But even the strongest hardware and software defenses cannot withstand the human element. The damage can be inflicted intentionally by demotivated employees or unintentionally by…

  • Security By Any Other Name

    by Wendy Nather on May 21, 2015

    If you went up to a pharmacist and said, “Hi, I need something to cure a case of the APTs,” what do you think she would recommend? A big issue with the security industry has to deal with the way we market and describe security technology. It used to be that products were described by functionality, with point features that were well understood: firewall, anti-virus, anti-spam, web filter, log…

  • Lessons Learned at RSAC 2015

    by Tony Kontzer on May 5, 2015

    Now that the curtain has fallen on the RSA Conference 2015, San Francisco edition, what have you learned? I can't speak for anyone else, but I returned from RSAC with a number of things bouncing around my head. For instance, right out of the gate, we learned that Amit Yoran is an energetic and forceful speaker who will carry the RSA Conference keynote torch with great aplomb. Yoran took the stage…

  • Everyone has a role to play in securing Asia’s digital future

    by Linda Gray on May 1, 2015

    Asia is in the middle of a digital revolution, with a booming market for consumer electronics and a fast-growing startup scene. The explosive growth makes organizations in the Asia-Pacific region especially attractive to criminals and hackers. They are playing a game of cat-and-mouse, with defenders trying to secure information within the enterprise and attackers trying to access it unlawfully. …

  • Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

    by Ben Rothke on April 29, 2015

    All encryption (with the exception of a one-time pad) can be broken. Bruce Schneier likes to use the analogy of a pole in the ground for encryption. You can try to break the pole (encryption); or simply go around the pole. Rather than finding problems with a proven encryption algorithm, attackers will try to go around it via how it’s implemented, and other similar attacks. In Phishing Dark Waters:…

  • The Future of Security Lies in Teaching Our Kids to Hack

    by Tony Kontzer on April 24, 2015

    You may have noticed that one of the themes of this year's RSA Conference is kids. They've been an overlooked part of technology industry events for too long, and this year RSAC is doing something about it. Two keynotes focused on making the Internet safer for kids. And a big chunk of the second floor concourse at Moscone West was made over into an interactive Cyber Village exhibit designed to…

  • Pentagon CIO Discusses His Security Plans

    by Tony Kontzer on April 23, 2015

    No one in the room was surprised when Terry Halvorsen, CIO of the U.S. Department of Defense, said during a RSA Conference forum session on Wednesday, "We're not easy to work with." With 1.4 million active-duty military personal to support, a roster of 500,000 contractors, and a requirement to answer to Congress, the DoD is, to put it mildly, a unique enterprise. "I’m Fortune Zero," Halvorsen…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 06 Jul 2015 03:18:37 -0400.
© 2015 EMC Corporation. All rights reserved.