Menu

Blogs

Showing Blog Posts: 11–20 of 202 tagged Cybersecurity

  • Learning About New Attack Techniques at RSAC 2015

    by Tony Kontzer on April 22, 2015

    A funny thing happened on my way to a session at the RSA Conference Tuesday. Long before I got there, and as I was checking messages on my phone, I nearly walked right into the back of a line. But for what? There were hundreds of people standing in line in the concourse, and hundreds of others rifling through their conference guides trying to figure out what all of the hubbub was. I smelled a…

  • RSAC 2015 Daily Recap: Wednesday

    by Fahmida Y. Rashid on April 22, 2015

    Day 3. Wednesday. Hump day! We are midway through RSA Conference, and there is still so much left to do. I spoke with an attendee who boasted he's been hitting over 10,000 steps on his FitBit everyday. I wonder what the average number of steps are among our attendees. Hope everyone has been eating healthy and drinking. We are exercising both our minds and bodies this week. Every day, sessions are…

  • Homeland Security Chief Talks Cybersecurity Mission at RSAC 2015

    by Tony Kontzer on April 21, 2015

    Jeh Johnson knows all too well how important security is. As the secretary of the U.S. Department of Homeland Security, Johnson not only is responsible for protecting the nation from terrorists, he's also accompanied by a secret service detail everywhere he goes. There was a time when that kind of physical security was enough, but the world has changed. During a keynote at the RSA Conference in…

  • Securosis Guide: The Security Bonk

    by Securosis Team on March 31, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. For better or worse, a bunch of the Securosis team have become endurance athletes. Probably more an indication of age impacting our explosiveness, and constant travel impacting our respective waistlines, than anything…

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

    by Ben Rothke on March 30, 2015

    Technology is neutral and non-moral. It’s the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit…

  • Smashing the Binary

    by Wendy Nather on March 16, 2015

    One big problem in security is the tendency to think in binary terms. Either you’re breached or you’re not; either you’re secure or you’re not. But this black-and-white worldview can be the cause of both technology and people problems. Is it possible to be a “little bit pwned”? Most would say no, although if you’re used to dealing with a wide spectrum of incidents within an organization, you know…

  • The Seeds of Security

    by Wendy Nather on February 12, 2015

    My colleague Garrett Bekker once described the security industry as a pomegranate. It is brilliantly accurate: from the outside it looks like one piece, but when you open up the fruit, you see hundreds of little seeds, and it all makes a big mess (and leaves stains on everything you touch). Is the industry really this bad? Yes, it is. Consider that in our 451 Research master list, we have over…

  • Working With Government: Information Sharing Laws

    by Todd Inskeep on February 4, 2015

    This is the second post in a multi-part series. The first post is here. Information sharing is one major aspect of the current calls for action on National Cyber Security issues. As I noted earlier, lawers, company executives, government officials and others have differing views on the need for new laws regarding information sharing. Information sharing has been discussed in the context of the…

  • The Practical Guide to HIPAA Privacy and Security Compliance

    by Ben Rothke on January 25, 2015

    From an information security perspective, there is nothing overly onerous with the HIPAA security and privacy requirements. But like all regulations, the devil is in the details. While HIPAA is meant to protect large-scale disclosure of patient data, some of it includes absurd requirements such as ensuring white-boards in hospital wards don’t have full patient information and that intravenous…

  • State of the Union Puts Cybersecurity on National Agenda

    by Fahmida Y. Rashid on January 21, 2015

    Buried among the slew of national issues such as equal pay, immigration reform, climate change and Ebola, President Barack Obama spent a few seconds talking about net neutrality and cybersecurity in his State of the Union speech Tuesday evening. While it's nice to see security on the general agenda, it's still too early to know the government's plans. The full paragraph from the State of the Union…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 05 Jul 2015 05:29:41 -0400.
© 2015 EMC Corporation. All rights reserved.