Menu

Blogs

Showing Blog Posts: 1–10 of 40 tagged IT

  • 2016 Is the Year of Developer-Driven Security

    by Chenxi Wang on January 26, 2016

    In the past 10 years or so, the security industry has gone through a number of paradigm changes, most of which were propelled by fundamental shifts in infrastructure or application-related technologies—think cloud or mobile. One such shift that is rapidly changing the way companies are approaching security involves the increasing power of developers and how application infrastructure is being…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

  • Encryption Rules Only Apply to Those Who Follow Them

    by Tony Bradley on January 18, 2016

    The world can be a dangerous place, and nations around the world must be vigilant to identify and prevent attacks from would-be terrorists. In the wake of recent terrorist attacks in Paris and in San Bernardino, Calif., there has been increased debate over the need for intelligence agencies to have some sort of back-door access to enable monitoring of encrypted data and communications. It’s an…

  • Your Security Resolutions for 2016

    by Wendy Nather on January 14, 2016

    We start the New Year with the best of intentions. We're going to join an ISAC and work out every day; consume only healthy and organic data; clean out our overstuffed Hadoop clusters and get rid of that out-of-fashion data; and measure our performance to match our goals. Oh yes, and we're going to stay within the security budget. But making lifestyle changes is hard, especially in security, where …

  • Death to Shelfware: 5 Steps for Buying the Security You Actually Need

    by RSAC Contributor on January 4, 2016

    At a time when the industry is urging for increased investment in security, we’re also seeing plenty of security products gathering dust. Efforts to do more are not bringing the expected results, mainly because there is a rush to solve the problem, and not enough time spent understanding how various threats fit together. Consider the five-step program below to improve the likelihood that the…

  • The CISO's End-of-Year Questionnaire: How Do You Show Security Success

    by RSAC Contributor on December 28, 2015

    With the end-of-the-year looming, CSOs/CISOs have to update the Board of Directors on how the company fared security-wise over the past year. Todd Feinman, CEO and founder of data management company Identity Finder, provides a checklist to guide that conversation. How do CSOs show security successes? The end of year boardroom discussion will focus primarily on 5 principal questions: 1. Were there…

  • Protecting a Ghost Town: How Stay Secure When Your Staff is on Vacation

    by Tony Bradley on December 15, 2015

    The doors are locked. The lights are off. All through the office not a creature is stirring, not even a mouse. Well, one can hope at least. In a few weeks that's how most organizations will look. Business will all-but-cease and many employees will be home celebrating the holidays with family and friends. Hackers, cybercriminals, and malware, on the other hand, will be putting in extra hours to…

  • Sometimes, You Need to Call the Professionals

    by Rook Security on December 8, 2015

    Implementing a strong cybersecurity program requires IT security personnel that most companies don't have on staff. The reasons are many, including lack of funds and a lack of awareness of security needs. It's also tough to find qualified IT security professionals. It's a difficult job that involves working long hours, sometimes on holidays and weekends. A security operations center (SOC) analyst…

  • How to Stay Safe on Cyber Monday

    by Jennifer Lawinski on November 30, 2015

    Tis the season for online fraud. And this year's Cyber Monday is expected to give cybercriminals more potential victims than ever before. Adobe expects online shoppers will spend more than $3 billion online today, and that's just the tip of the iceberg. More than 270 million shoppers are expected to spend more than $83 billion throughout the holiday season, and more than half of those purchases…

  • Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center

    by Ben Rothke on October 21, 2015

    Building a large enterprise data center is a mammoth task with myriad details. In an encyclopedic work, Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center, (Morgan Kaufmann ISBN 978-0128014134), authors Caesar Wu and Rajkumar Buyya have written an extremely detailed and comprehensive guide on how to effectively build a cloud data center. …

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 10 Feb 2016 15:00:27 -0500.
© 2016 EMC Corporation. All rights reserved.