Menu

Blogs

Showing Blog Posts: 41–50 of 140 tagged Security

  • Catching Up With Martin Fink

    by Jennifer Lawinski on January 29, 2016

    Martin Fink is Executive Vice President, Chief Technology Officer and Director of Hewlett Packard Labs, the company’s exploratory and advanced research group. In advance of RSA Conference 2016, we asked him about the state of the information security industry and what he thinks about its future. RSAC: What excites you the most about working in the info security industry? Fink: I'm often amazed at…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 1: From Crypto to Cyber

    by Wade Baker on January 27, 2016

    This is the first in a series. You can read the second, third and fourth parts here. Last May, I wrote a blog post in response to my daughter’s question “what’s the RSA Conference about, Daddy?” Being a data-driven guy, I wanted to give her an answer that used a quantitative approach, but also captured qualitative aspects of the event as well. I was able to obtain session titles from the RSAC…

  • 2016 Is the Year of Developer-Driven Security

    by Chenxi Wang on January 26, 2016

    In the past 10 years or so, the security industry has gone through a number of paradigm changes, most of which were propelled by fundamental shifts in infrastructure or application-related technologies—think cloud or mobile. One such shift that is rapidly changing the way companies are approaching security involves the increasing power of developers and how application infrastructure is being…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

  • Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

    by Ben Rothke on January 19, 2016

    Anyone who has spent time in the information security industry knows what while there is good data around; there is a lot to be desired in terms of empirical and measurable information security data. There’s too much marketing hype, combined with firms who often don’t know how to make sense out of their own data. In Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems…

  • Weekend Reading: Microsoft Silverlight and the Internet of Things

    by Jennifer Lawinski on January 15, 2016

    We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the cybersecurity world, chosen by the field's best writers and editors. This week we take a look at Microsoft Silverlight, the Internet of Things and whether security metrics are actually doing you any…

  • Women in Tech: Exploring the Benefits of Diversity in Cybersecurity with Niloofar Razi Howe

    by Jennifer Lawinski on January 12, 2016

    RSA’s Chief Strategy Officer Niloofar Razi Howe has spent more than 25 years working in for or investing in technology companies, with a focus in the past decade on the security industry. We sat down with her to talk about her career, what challenges she sees for women in the security industry, and how diversity affects the workplace. You can read the first part of our conversation with Niloofar…

  • Security and Innovation: A Conversation with RSA's Niloofar Razi Howe

    by Jennifer Lawinski on January 7, 2016

    Innovation and security go hand-in-hand, and no one knows that better than RSA’s Chief Strategy Officer Niloofar Razi Howe. As the RSA Conference team gets ready for the big event, and the Innovation Sandbox competition, in San Francisco this year, we sat down with Ms. Howe to talk about innovation, security and the unique role startups will play in helping drive the future of the InfoSec…

  • A ‘Golden Key’ to Unlock Encryption Is the Wrong Approach

    by Robert Ackerman Jr. on December 22, 2015

    This post in our VC-series comes from Robert R. Ackerman, Jr., the founder and managing director of Allegis Capital. It seems like an appealing strategy—give the FBI and other law enforcement agencies, as well as our spy organizations, a back door— a “golden key”—to unveil encrypted communications to help catch criminals and terrorists and protect Americans from harm. This is particularly…

  • Security in 2016: The RSAC Advisory Board's Industry Predictions

    by Jennifer Lawinski on December 21, 2015

    The security landscape is constantly evolving, and while it's hard to predict the future, the experts of the RSAC Advisory Board have rubbed their crystal balls and offer some insight into where they see the industry moving next year. What can we expect to see in 2016? Healthcare data will be more valuable to hackers, although experts disagree on how high-profile hacks will be next year. …

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 02 May 2016 06:42:39 -0400.
© 2016 EMC Corporation. All rights reserved.