Menu

Blogs

Showing Blog Posts: 11–20 of 105 tagged Security

  • Weekend Reading: Microsoft Silverlight and the Internet of Things

    by Jennifer Lawinski on January 15, 2016

    We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the cybersecurity world, chosen by the field's best writers and editors. This week we take a look at Microsoft Silverlight, the Internet of Things and whether security metrics are actually doing you any…

  • Women in Tech: Exploring the Benefits of Diversity in Cybersecurity with Niloofar Razi Howe

    by Jennifer Lawinski on January 12, 2016

    RSA’s Chief Strategy Officer Niloofar Razi Howe has spent more than 25 years working in for or investing in technology companies, with a focus in the past decade on the security industry. We sat down with her to talk about her career, what challenges she sees for women in the security industry, and how diversity affects the workplace. You can read the first part of our conversation with Niloofar…

  • Security and Innovation: A Conversation with RSA's Niloofar Razi Howe

    by Jennifer Lawinski on January 7, 2016

    Innovation and security go hand-in-hand, and no one knows that better than RSA’s Chief Strategy Officer Niloofar Razi Howe. As the RSA Conference team gets ready for the big event, and the Innovation Sandbox competition, in San Francisco this year, we sat down with Ms. Howe to talk about innovation, security and the unique role startups will play in helping drive the future of the InfoSec…

  • A ‘Golden Key’ to Unlock Encryption Is the Wrong Approach

    by RSAC Contributor on December 22, 2015

    This post in our VC-series comes from Robert R. Ackerman, Jr., the founder and managing director of Allegis Capital. It seems like an appealing strategy—give the FBI and other law enforcement agencies, as well as our spy organizations, a back door— a “golden key”—to unveil encrypted communications to help catch criminals and terrorists and protect Americans from harm. This is particularly…

  • Security in 2016: The RSAC Advisory Board's Industry Predictions

    by Jennifer Lawinski on December 21, 2015

    The security landscape is constantly evolving, and while it's hard to predict the future, the experts of the RSAC Advisory Board have rubbed their crystal balls and offer some insight into where they see the industry moving next year. What can we expect to see in 2016? Healthcare data will be more valuable to hackers, although experts disagree on how high-profile hacks will be next year. …

  • Why a Code Freeze Is a Cybercriminal’s Best Friend

    by Tony Bradley on December 17, 2015

    As we wind down 2015 and businesses prepare to shut down for the extended holiday break, many will also implement a code freeze. The code freeze is a normal operating procedure that occurs regularly as an application or software update nears release, or whenever there’s a crucial business milestone—like end of quarter or end of fiscal year. Unfortunately, a code freeze also means that…

  • Startup Innovation Is the Future of Information Security

    by Jennifer Lawinski on December 9, 2015

    Innovation is no stranger to information security. There is a new security-focused startup coming out of stealth every few weeks. There are lots of infosec challenges, and startups are poised to tackle some of them. There are plenty of failures in information security—whether we are looking at companies slapping new marketing labels on ineffective security solutions, data breaches, or serious…

  • Sometimes, You Need to Call the Professionals

    by Rook Security on December 8, 2015

    Implementing a strong cybersecurity program requires IT security personnel that most companies don't have on staff. The reasons are many, including lack of funds and a lack of awareness of security needs. It's also tough to find qualified IT security professionals. It's a difficult job that involves working long hours, sometimes on holidays and weekends. A security operations center (SOC) analyst…

  • Introducing Weekend Reading

    by Jennifer Lawinski on December 4, 2015

    How many times have you come across an article that you'd love to read and found yourself closing the tab at the end of the day? Or saving it to Instapaper never to set eyes on it again? There's a lot of excellent news and analysis on information security, and we're experimenting with a new feature here at RSA Conference: Weekend Reading. On Friday afternoon, we'll post a roundup of some of the…

  • Reflections on RSA Conference 2015 Abu Dhabi

    by RSAC Contributor on December 3, 2015

    RSA Conference goes to the Middle East for the first time with RSA Conference 2015 Abu Dhabi. Rashed Al Oraimi, lead technologist at Booz Allen Hamilton, provided the following report. It was the last working day of the week in Abu Dhabi, and most of us were planning our weekends with family, yet the floors at Emirate Palace hotel were jam-packed with computer security professionals and companies…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 09 Feb 2016 00:42:35 -0500.
© 2016 EMC Corporation. All rights reserved.