Menu

Blogs

Showing Blog Posts: 11–20 of 140 tagged Security

  • The Cybersecurity Act of 2015 Is a Necessary Stake in the Ground

    by Robert Ackerman Jr. on March 18, 2016

    The Cybersecurity Act of 2015 is approaching its three-month birthday, but you can be excused if you’re oblivious to that. After all, many people probably don’t know it even exists. Very quietly, the law—the first major piece of Congressional cybersecurity legislation, one designed to address the explosive growth of successful cyberattacks—was signed into law in mid-December 2015 by President…

  • Why Cybersecurity Information Sharing Is Important

    by Rook Security on March 17, 2016

    By Tom Gorup The more information, the better. Right? In most cases, that is the truth. However, the way in which information is shared makes all the difference. Companies don’t share cybersecurity information because they fear attacker retribution and legal recourse. They don’t want to cause further retaliation from an attacker or show so much transparency that they could possibly cause the…

  • Building a Security Plan from Scratch: Kodak Alaris

    by David Needle on March 16, 2016

    Companies don’t often have the luxury of starting over when it comes to security, because there is usually legacy infrastructure to consider. As companies consider a move to the cloud, they're getting more flexibility, but even that typically takes a hybrid approach, moving some operations gradually off-premises while still keeping considerable infrastructure on-premises. Kodak Alaris, however, …

  • Ransomware Goes Corporate in 2016

    by RSAC Contributor on March 15, 2016

    This post comes from Liviu Arsene, security analyst at Bitdefender. The ransomware threat is growing. More than 13.1 million U.S. users—4.1 percent of the total population—have encountered ransomware, and half of them paid the ransom to recover their personal data. Another 40 percent would actually consider paying, according to a recent study we commissioned. In our security predictions for 2016, …

  • RSA Conference 2016: The Week in Review

    by Tony Kontzer on March 11, 2016

    I don't know about you, but I always find myself swept away by the momentum of a big event like the just-concluded RSA Conference, but when it ends, brother, do I get a conference hangover. For what seems like days after I return home, my brain is mush and I can fall asleep on a dime. If anyone in my house so much as whispered the term "information security" during those first days back, I'd cut…

  • How to Become a Super CISO

    by David Needle on March 10, 2016

    Want to be the best CISO you can be? Take a word of advice from Todd Fitzgerald, Global Director of Information Security at Grant Thornton International, who gave a detailed and often entertaining presentation on Friday, the last day of the RSA Conference. Fitzgerald talked about his own journey to becoming a security professional, the current state of security affairs, and what’s needed going…

  • A Look Back at RSA Conference 2016

    by Jennifer Lawinski on March 9, 2016

    We came. We saw. We talked a lot about encryption. If you attended the RSA Conference in San Francisco last week, the odds are good you have an opinion on whether Apple should comply with the FBI’s request to unlock a terrorist’s iPhone. And if you didn’t come with an opinion of your own, there were plenty to be heard. Keynote speakers from the worlds of technology and government shared their…

  • Security Panel Warns IoT Will Change the Security Game

    by David Needle on March 4, 2016

    The year 2020, once a faraway-sounding era of future scientific marvels, is now only four short years away. When we get there we may still not have those flying cars we were promised decades ago, but the world will be very different than it is today. “There’s no doubt the hyper-connected world of 2020 will change how we live, work and play,” said Symantec CEO Michael Brown in an afternoon…

  • RSA President Amit Yoran: 'Our Problem Isn't a Technology Problem'

    by Tony Kontzer on March 1, 2016

    When Amit Yoran took the stage for his keynote address at this week's RSA Conference in San Francisco, most of the thousands of attendees in the audience probably expected to hear about how a new generation of security technologies would help companies get a leg up on the growing array of threats they face today. What they didn't expect was to be told that the greatest weapons in their security…

  • Phantom Takes Top Honors at RSAC 2016 Innovation Sandbox Competition

    by Tony Kontzer on February 29, 2016

    If there was any doubt remaining that these are good times for the information security industry, it was erased during the opening day of the RSA Conference, as hundreds of attendees queued up to hear about the hottest startups during the annual Innovation Sandbox competition. It was a much more tightly-packed room than previous years, for numerous reasons. Some people were there looking for…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 04 May 2016 22:54:38 -0400.
© 2016 EMC Corporation. All rights reserved.