Menu

Blogs

Showing Blog Posts: 21–30 of 292 tagged Cybersecurity

  • Why Cybersecurity Information Sharing Is Important

    by Rook Security on March 17, 2016

    By Tom Gorup The more information, the better. Right? In most cases, that is the truth. However, the way in which information is shared makes all the difference. Companies don’t share cybersecurity information because they fear attacker retribution and legal recourse. They don’t want to cause further retaliation from an attacker or show so much transparency that they could possibly cause the…

  • Building a Security Plan from Scratch: Kodak Alaris

    by David Needle on March 16, 2016

    Companies don’t often have the luxury of starting over when it comes to security, because there is usually legacy infrastructure to consider. As companies consider a move to the cloud, they're getting more flexibility, but even that typically takes a hybrid approach, moving some operations gradually off-premises while still keeping considerable infrastructure on-premises. Kodak Alaris, however, …

  • Ransomware Goes Corporate in 2016

    by RSAC Contributor on March 15, 2016

    This post comes from Liviu Arsene, security analyst at Bitdefender. The ransomware threat is growing. More than 13.1 million U.S. users—4.1 percent of the total population—have encountered ransomware, and half of them paid the ransom to recover their personal data. Another 40 percent would actually consider paying, according to a recent study we commissioned. In our security predictions for 2016, …

  • How to Become a Super CISO

    by David Needle on March 10, 2016

    Want to be the best CISO you can be? Take a word of advice from Todd Fitzgerald, Global Director of Information Security at Grant Thornton International, who gave a detailed and often entertaining presentation on Friday, the last day of the RSA Conference. Fitzgerald talked about his own journey to becoming a security professional, the current state of security affairs, and what’s needed going…

  • A Look Back at RSA Conference 2016

    by Jennifer Lawinski on March 9, 2016

    We came. We saw. We talked a lot about encryption. If you attended the RSA Conference in San Francisco last week, the odds are good you have an opinion on whether Apple should comply with the FBI’s request to unlock a terrorist’s iPhone. And if you didn’t come with an opinion of your own, there were plenty to be heard. Keynote speakers from the worlds of technology and government shared their…

  • A Geek’s Guide to Getting People to Hear You

    by David Needle on March 8, 2016

    Tech people love to talk, but does anyone hear what they have to say? “Why Won’t Anyone Listen to Us?” was a very entertaining and informative talk given by Josh Bressers, a Security Strategist at Red Hat, at the RSA conference last week. Bressers framed the issue right from the start. “We are all bad at talking to people and some of us don’t even know it,” he said. “This is why nobody takes us…

  • Security Panel Warns IoT Will Change the Security Game

    by David Needle on March 4, 2016

    The year 2020, once a faraway-sounding era of future scientific marvels, is now only four short years away. When we get there we may still not have those flying cars we were promised decades ago, but the world will be very different than it is today. “There’s no doubt the hyper-connected world of 2020 will change how we live, work and play,” said Symantec CEO Michael Brown in an afternoon…

  • CISOs Share Tales From the Trenches at RSA Conference 2016

    by Tony Kontzer on March 3, 2016

    There are many themes that stretch across the information security world, but most organizations face their own particular challenges that require customized approaches. This was the clear takeaway from a well-attended panel at the RSA Conference Thursday, Lessons Learned from Real-World CISOs, during which CISOs from the medical device, education, health insurance and consumer goods sectors…

  • How Law Enforcement Agencies Fight Cyber Crime

    by Tony Kontzer on March 3, 2016

    Information security professionals have a plethora of technological tools at their disposal to fight would-be attackers—and more are on the way. The traditional prevention, detection and response technologies are soon to be augmented by innovative new tools that can do things such as spoof entire network topographies on the fly to deceive attackers. Yet a panel of federal law enforcement…

  • Palo Alto Networks CEO ‘Next Gen Security Solutions Must Restore Trust’

    by David Needle on March 3, 2016

    Mark McLaughlin, CEO of Palo Alto Networks, said traditional approaches to computer security are doomed to fail or at least fall well short of providing the kind of broad protection and prevention today’s enterprises need. Speaking on “The (Inevitable?) Decline of the Digital Age” at the RSA conference, McLaughlin said new, more comprehensive preventative measures are needed to battle cyber…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 04 May 2016 21:00:19 -0400.
© 2016 EMC Corporation. All rights reserved.