Menu

Blogs

Showing Blog Posts: 11–20 of 206 tagged Cybersecurity

  • Everyone has a role to play in securing Asia’s digital future

    by Linda Gray on May 1, 2015

    Asia is in the middle of a digital revolution, with a booming market for consumer electronics and a fast-growing startup scene. The explosive growth makes organizations in the Asia-Pacific region especially attractive to criminals and hackers. They are playing a game of cat-and-mouse, with defenders trying to secure information within the enterprise and attackers trying to access it unlawfully. …

  • Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

    by Ben Rothke on April 29, 2015

    All encryption (with the exception of a one-time pad) can be broken. Bruce Schneier likes to use the analogy of a pole in the ground for encryption. You can try to break the pole (encryption); or simply go around the pole. Rather than finding problems with a proven encryption algorithm, attackers will try to go around it via how it’s implemented, and other similar attacks. In Phishing Dark Waters:…

  • The Future of Security Lies in Teaching Our Kids to Hack

    by Tony Kontzer on April 24, 2015

    You may have noticed that one of the themes of this year's RSA Conference is kids. They've been an overlooked part of technology industry events for too long, and this year RSAC is doing something about it. Two keynotes focused on making the Internet safer for kids. And a big chunk of the second floor concourse at Moscone West was made over into an interactive Cyber Village exhibit designed to…

  • Pentagon CIO Discusses His Security Plans

    by Tony Kontzer on April 23, 2015

    No one in the room was surprised when Terry Halvorsen, CIO of the U.S. Department of Defense, said during a RSA Conference forum session on Wednesday, "We're not easy to work with." With 1.4 million active-duty military personal to support, a roster of 500,000 contractors, and a requirement to answer to Congress, the DoD is, to put it mildly, a unique enterprise. "I’m Fortune Zero," Halvorsen…

  • RSAC 2015 Daily Recap: Wednesday

    by Fahmida Y. Rashid on April 22, 2015

    Day 3. Wednesday. Hump day! We are midway through RSA Conference, and there is still so much left to do. I spoke with an attendee who boasted he's been hitting over 10,000 steps on his FitBit everyday. I wonder what the average number of steps are among our attendees. Hope everyone has been eating healthy and drinking. We are exercising both our minds and bodies this week. Every day, sessions are…

  • Learning About New Attack Techniques at RSAC 2015

    by Tony Kontzer on April 22, 2015

    A funny thing happened on my way to a session at the RSA Conference Tuesday. Long before I got there, and as I was checking messages on my phone, I nearly walked right into the back of a line. But for what? There were hundreds of people standing in line in the concourse, and hundreds of others rifling through their conference guides trying to figure out what all of the hubbub was. I smelled a…

  • Homeland Security Chief Talks Cybersecurity Mission at RSAC 2015

    by Tony Kontzer on April 21, 2015

    Jeh Johnson knows all too well how important security is. As the secretary of the U.S. Department of Homeland Security, Johnson not only is responsible for protecting the nation from terrorists, he's also accompanied by a secret service detail everywhere he goes. There was a time when that kind of physical security was enough, but the world has changed. During a keynote at the RSA Conference in…

  • Securosis Guide: The Security Bonk

    by Securosis Team on March 31, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. For better or worse, a bunch of the Securosis team have become endurance athletes. Probably more an indication of age impacting our explosiveness, and constant travel impacting our respective waistlines, than anything…

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

    by Ben Rothke on March 30, 2015

    Technology is neutral and non-moral. It’s the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit…

  • Smashing the Binary

    by Wendy Nather on March 16, 2015

    One big problem in security is the tendency to think in binary terms. Either you’re breached or you’re not; either you’re secure or you’re not. But this black-and-white worldview can be the cause of both technology and people problems. Is it possible to be a “little bit pwned”? Most would say no, although if you’re used to dealing with a wide spectrum of incidents within an organization, you know…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 30 Aug 2015 18:30:57 -0400.
© 2015 EMC Corporation. All rights reserved.