Menu

Blogs

Showing Blog Posts: 1–10 of 36 tagged Infrastructure

  • Hadoop Security: Protecting Your Big Data Platform

    by Ben Rothke on May 2, 2016

    As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices. When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop. …

  • Defense in Depth Is Necessary, But Not Sufficient: Five Best Practices for Managing and Controlling Third-Party Risk

    by RSAC Contributor on March 22, 2016

    This post was written by Mordecai Rosen, ‎General Manager, Security, CA Technologies. If data breaches such as those experienced by Home Depot, Target and Anthem taught us anything, it is that defense in depth needs a boost to include defense in breadth. Nearly two-thirds of companies extensively or significantly use third-party solutions in their organizations. Relying on a partner’s security and…

  • Building a Security Plan from Scratch: Kodak Alaris

    by David Needle on March 16, 2016

    Companies don’t often have the luxury of starting over when it comes to security, because there is usually legacy infrastructure to consider. As companies consider a move to the cloud, they're getting more flexibility, but even that typically takes a hybrid approach, moving some operations gradually off-premises while still keeping considerable infrastructure on-premises. Kodak Alaris, however, …

  • Year in Review: Your Favorite Stories of 2015

    by Jennifer Lawinski on December 30, 2015

    The end of the year is always a time for reflection, and as we start thinking about our New Year's Resolutions, it can be helpful to take a look at what we learned the year before--or at least in what we liked reading. Last year you were interested in a wide variety of topics including books on cybersecurity, methods of attack and learning more about the RSA Conference. What were your favorite…

  • How to Enjoy the Holidays in Peace (While Keeping the Network Secure)

    by Tony Bradley on December 10, 2015

    I’m not sure why we even bother showing up to work in the month of December. The first week is spent coming down off of the Thanksgiving-gluttony food coma and frantically shopping online during work hours to find holiday gift bargains. We show up for the next two weeks because of a mandatory requirement to be physically present (even though you’ve already mentally checked out) and you’re just…

  • Cyberattacks on Industry in the Middle East

    by RSAC Contributor on November 24, 2015

    This post comes from Joe Shenouda, CYBERPOL / ECIPS Liaison Officer. He reflects on the cybersecurity space in the Middle East. The Middle East critical infrastructure market is huge and at risk. It will hit 12 billion Euro in revenue by 2018, and it is the victim of a rising and ongoing aggressive cyberwar that barely makes the news. The Middle East's oil industry is huge and has 80 percent of…

  • Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center

    by Ben Rothke on October 21, 2015

    Building a large enterprise data center is a mammoth task with myriad details. In an encyclopedic work, Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center, (Morgan Kaufmann ISBN 978-0128014134), authors Caesar Wu and Rajkumar Buyya have written an extremely detailed and comprehensive guide on how to effectively build a cloud data center. …

  • Why It Costs More to Protect Your Virtual Infrastructure

    by Tony Bradley on October 19, 2015

    Security incidents are expensive, but not all security incidents are created equally. A recent study found that businesses pay a significant premium for incident response and recovery affecting a virtual infrastructure. Respondents representing more than 5,500 different companies across 25 different countries participated in the survey. The purpose of the survey was to learn more about the cost of…

  • Treat Yourself to a SPA, Not a Pen Test

    by Rook Security on August 27, 2015

    A lot of companies are asked to do a pen test by their clients, because they think a pen test will let them know if their business partner’s technology is “secure” against cyber threats. The scan happens. The areas that need to be fixed are fixed. And the client feels warm and fuzzy inside. However, this feeling is misleading as the company isn't necessarily more secure— all it says is that you…

  • Change Your Gears

    by Securosis Team on August 17, 2015

    I'm a cyclist. Not necessarily a very good one, but I can hold my own in the middle of the pack. On group rides you always have the person who locks into a gear and sticks with it. Their pedaling cadence slows on hills, speeds up on inclines, and they don't really shift a lot. It isn't overly efficient, especially compared to the pro-level riders who keep a constant cadence and work the shifter…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 30 May 2016 16:22:09 -0400.
© 2016 EMC Corporation. All rights reserved.