Blogs

Showing Blog Posts: 1–10 of 12 tagged Infrastructure

  • Security Metrics: How Are You Measuring Security?

    by Joshua Marpet on August 12, 2014

    Do you have an information security practice? How do you measure its effectiveness? By the number of tickets generated? The number of viruses found and stamped out? Or by how quiet it is?—"If they don't bother me, they must be doing their job!" Have the security metrics guidelines changed in the last few years as infosec moved away from a helpdesk mentality, towards a penetration tester's…

  • The Future Is Now: Threats That Were Never Supposed to Happen Are Here

    by John Linkous on July 29, 2014

    Recently, I took the opportunity to install the latest version of Pwnie Express's Pwn Pad 2014ce on my Google Nexus 7 tablet. For those who aren't familiar with the Pwn Pad, it's a modified version of the Kali Linux distribution that provides a complete, walking environment for detecting and—as a white-hat only, of course—testing information security threats. While the Pwn Pad is a great mobile…

  • Robust Security Intelligence: How Different Security Infrastructures Measure Up

    by Christopher Burgess on July 25, 2014

    What constitutes good security infrastructure? Ask a member of a security vendor's sales team, and he might hand you an order book with all the boxes checked. Ask a consultant, and her solution might focus on an extended hand-holding engagement. Ask a member of a country's cybersecurity emergency response team (CERT), and he will talk about national infrastructure and public-private partnerships. …

  • Tough Times for Security on the Internet of Things

    by John Linkous on June 16, 2014

    You've just returned home from a two-week Caribbean vacation. You're tanned, well-rested, and happy. You even got the bump to first class on your flight back home. Everything is great. As the plane lands and you turn on your smartphone, you connect to the "Internet of Things" via your home appliance app, to set the correct temperature in the house and turn on the outside lights. The funny thing…

  • Organizations Talk About Big Data More Than They Use It

    by Robert Moskowitz on June 13, 2014

    Lots of enterprise representatives are making claims about their movement into big data, but when you look behind the curtain, you can see they're moving at the rate of molasses. Here are some suggestions about why this may be the case, and how your organization can take steps to speed up the transition process: One reason may be that your organization has little idea of what it might do with so…

  • The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments

    by Ben Rothke on February 3, 2014

    At first glance, The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments appears like a standard coffee table book with some great visuals and photos of various data centers throughout the world. Once you get a few pages into the book, you see it is indeed not a light-read coffee table book, rather an insightful book where some of the brightest…

  • Testing Cloud Services: How to Test SaaS, PaaS & IaaS

    by Ben Rothke on October 29, 2013

    Gartner Fellow and analyst David Mitchell Smith wrote in his report Hype Cycle for Cloud Computing last year - that while clearly maturing and beyond the peak of inflated expectations, cloud computing continues to be one of the most hyped subjects in IT. The report is far from perfect, but it is accurate in the sense that while cloud computing is indeed ready for prime time, the hype with it…

  • SCADA and Me

    by Ben Rothke on September 12, 2013

    When is the right time to talk to your kids about SCADA? According to the new book SCADA and Me, the time is now. The book bills itself as a book for children and management. Truth be told, that is a hard, if not impossible combination to write for. The reality is that SCADA is not child’s play. The underlying theme of the book is that SCADA is critical to our national infrastructure and that it’s…

  • Hacking Exposed Mobile Security Secrets and Solutions

    by Ben Rothke on August 5, 2013

    Little did anyone know that when the first Hacking Exposed book came out over 15 years ago, that it would launch a large set of sequels. In 2013, the newest version is Hacking Exposed Mobile Security Secrets & Solutions. When the first edition of Hacking Exposed was published, Windows was dominant. In 2013, Windows is a dying operating system and mobile is the new king. In the book, the authors…

  • Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

    by Ben Rothke on July 10, 2013

    Every organization has external software, hardware and 3 rd -party vendors they have to deal with. In many cases, these vendors will have direct access to the corporate networks, confidential and proprietary data and more. Often the software and hardware solutions are critical to the infrastructure and security of the organization. If the vendors don’t have effective information security and…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 20 Aug 2014 08:39:57 -0400.
© 2014 EMC Corporation. All rights reserved.