Menu

Blogs

Showing Blog Posts: 1–10 of 29 tagged Mobile

  • Enterprise Security Concerns for Consumer IoT Devices

    by RSAC Contributor on April 22, 2016

    By Andrew Hay, CISO, DataGravity “What are the security implications of consumer Internet of Things (IoT) devices being introduced into modern business environments and how to you protect your organization as a result?” At RSA 2016 I was able to pose this question to a full room of business executives, IT architects, and security analysts who were responsible for dealing with this very real…

  • How to Use Anonymized Global Digital Identities to Fight Cybercrime

    by Alisdair Faulkner on April 8, 2016

    At the 2016 RSA Conference, there was a lot of buzz surrounding the importance of global threat intelligence sharing. In fact, of the more than 500 exhibitors at the annual conference, 79 companies include threat intelligence sharing as part of their business model. However, such information sharing only works when done right—in an anonymized way that takes into account each user’s full digital…

  • RSAC 2016 Keynote Speakers Talk Apple, Encryption and the FBI

    by Tony Kontzer on March 1, 2016

    It's official: The information security community is firmly behind Apple in its battle with the FBI over the fate of the infamous iPhone 5 belonging to one of the shooters in last year's terrorist attack in San Bernardino, Calif. A succession of keynote speakers Tuesday at the RSA Conference in San Francisco made their allegiances clear, agreeing with Apple's perspective that developing a…

  • Protecting Against the Top Mobile Security Threats in 2016

    by Alisdair Faulkner on February 10, 2016

    By the end of 2016 there will be an estimated 6.4 billion connected devices—a 30 percent increase over 2015—as mobile continues to become the channel-of-choice for everything from online banking to e-commerce. This mobile proliferation is attracting cybercriminals too, and they use stolen identities and compromised devices from major data breaches for advantageous financial gain. Given the…

  • Vulnerabilities for OS X and iOS Take the Spotlight in 2015

    by RSAC Contributor on December 29, 2015

    This post comes from Liviu Arsene, security analyst at Bitdefender. The common belief that Apple’s OS X and iOS are not as prone to vulnerabilities and attacks as other popular operating systems has been put to the test in 2015. As OS X and iOS adoption increases in the enterprise segment—partly due to a new generation of “millennial” managers—attackers will likely target the two platforms more. …

  • Taking Stock: Ranking the Next Billion-Dollar CyberSecurity Markets

    by RSAC Contributor on October 14, 2015

    This post in our VC-series comes from Venky Ganesan, managing director and cybersecurity investor of Menlo Ventures. With IT security spending estimated to crest the $75 billion annual mark before the end of 2015, there’s no shortage of emerging security sectors that will soon cross $1 billion in annual revenues. At the same time, with so many startups pursuing cybersecurity solutions, venture…

  • RSA Conference Asia Pacific Japan Friday Preview

    by Fahmida Y. Rashid on July 24, 2015

    There are 28 sessions to choose from on the final day of RSA Conference Asia Pacific & Japan 2015. While the first day of sessions offered a lot of region-specific content, the second is more general. Instead of being region-specific, the sessions are more strategic, providing insights on specific topics. Mobile payments is a popular topic, but it is a concept with a lot of traction in Asia. Many…

  • Innovation Sandbox Contest Returns to RSA Conference APJ 2015

    by Fahmida Y. Rashid on July 21, 2015

    While the RSA Conference Asia-Pacific and Japan 2015 starts with the keynotes on Wednesday, July 22, there are plenty of events on Tuesday, including the CSA Summit and Innovation Sandbox. Innovation is a popular word, especially in security circles. Everyone thinks their approach to solving a security problem is the right way to fix the problems plaguing the industry. Who doesn’t want to stand out…

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

    by Ben Rothke on March 30, 2015

    Technology is neutral and non-moral. It’s the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit…

  • Guidelines for Mobile Computing Security

    by Robert Moskowitz on December 15, 2014

    Mobililty is clearly the future of computing. Smartphones and tablets are more powerful and bring-your-own device is an accepted reality. This raises major security issues, as mobile computing can be readily compromised at the device, network and wireless connectivity levels. The mobile device itself—whether a portable computer, personal digital assistant, laptop, smartphone, tablet computer, or…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 30 Apr 2016 20:27:36 -0400.
© 2016 EMC Corporation. All rights reserved.