Menu

Blogs

Showing Blog Posts: 11–20 of 107 tagged Security

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

  • Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

    by Ben Rothke on January 19, 2016

    Anyone who has spent time in the information security industry knows what while there is good data around; there is a lot to be desired in terms of empirical and measurable information security data. There’s too much marketing hype, combined with firms who often don’t know how to make sense out of their own data. In Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems…

  • Weekend Reading: Microsoft Silverlight and the Internet of Things

    by Jennifer Lawinski on January 15, 2016

    We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the cybersecurity world, chosen by the field's best writers and editors. This week we take a look at Microsoft Silverlight, the Internet of Things and whether security metrics are actually doing you any…

  • Women in Tech: Exploring the Benefits of Diversity in Cybersecurity with Niloofar Razi Howe

    by Jennifer Lawinski on January 12, 2016

    RSA’s Chief Strategy Officer Niloofar Razi Howe has spent more than 25 years working in for or investing in technology companies, with a focus in the past decade on the security industry. We sat down with her to talk about her career, what challenges she sees for women in the security industry, and how diversity affects the workplace. You can read the first part of our conversation with Niloofar…

  • Security and Innovation: A Conversation with RSA's Niloofar Razi Howe

    by Jennifer Lawinski on January 7, 2016

    Innovation and security go hand-in-hand, and no one knows that better than RSA’s Chief Strategy Officer Niloofar Razi Howe. As the RSA Conference team gets ready for the big event, and the Innovation Sandbox competition, in San Francisco this year, we sat down with Ms. Howe to talk about innovation, security and the unique role startups will play in helping drive the future of the InfoSec…

  • A ‘Golden Key’ to Unlock Encryption Is the Wrong Approach

    by RSAC Contributor on December 22, 2015

    This post in our VC-series comes from Robert R. Ackerman, Jr., the founder and managing director of Allegis Capital. It seems like an appealing strategy—give the FBI and other law enforcement agencies, as well as our spy organizations, a back door— a “golden key”—to unveil encrypted communications to help catch criminals and terrorists and protect Americans from harm. This is particularly…

  • Security in 2016: The RSAC Advisory Board's Industry Predictions

    by Jennifer Lawinski on December 21, 2015

    The security landscape is constantly evolving, and while it's hard to predict the future, the experts of the RSAC Advisory Board have rubbed their crystal balls and offer some insight into where they see the industry moving next year. What can we expect to see in 2016? Healthcare data will be more valuable to hackers, although experts disagree on how high-profile hacks will be next year. …

  • Why a Code Freeze Is a Cybercriminal’s Best Friend

    by Tony Bradley on December 17, 2015

    As we wind down 2015 and businesses prepare to shut down for the extended holiday break, many will also implement a code freeze. The code freeze is a normal operating procedure that occurs regularly as an application or software update nears release, or whenever there’s a crucial business milestone—like end of quarter or end of fiscal year. Unfortunately, a code freeze also means that…

  • Startup Innovation Is the Future of Information Security

    by Jennifer Lawinski on December 9, 2015

    Innovation is no stranger to information security. There is a new security-focused startup coming out of stealth every few weeks. There are lots of infosec challenges, and startups are poised to tackle some of them. There are plenty of failures in information security—whether we are looking at companies slapping new marketing labels on ineffective security solutions, data breaches, or serious…

  • Sometimes, You Need to Call the Professionals

    by Rook Security on December 8, 2015

    Implementing a strong cybersecurity program requires IT security personnel that most companies don't have on staff. The reasons are many, including lack of funds and a lack of awareness of security needs. It's also tough to find qualified IT security professionals. It's a difficult job that involves working long hours, sometimes on holidays and weekends. A security operations center (SOC) analyst…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 12 Feb 2016 02:40:48 -0500.
© 2016 EMC Corporation. All rights reserved.