Menu

Blogs

Showing Blog Posts: 51–60 of 140 tagged Security

  • Why a Code Freeze Is a Cybercriminal’s Best Friend

    by Tony Bradley on December 17, 2015

    As we wind down 2015 and businesses prepare to shut down for the extended holiday break, many will also implement a code freeze. The code freeze is a normal operating procedure that occurs regularly as an application or software update nears release, or whenever there’s a crucial business milestone—like end of quarter or end of fiscal year. Unfortunately, a code freeze also means that…

  • Startup Innovation Is the Future of Information Security

    by Jennifer Lawinski on December 9, 2015

    Innovation is no stranger to information security. There is a new security-focused startup coming out of stealth every few weeks. There are lots of infosec challenges, and startups are poised to tackle some of them. There are plenty of failures in information security—whether we are looking at companies slapping new marketing labels on ineffective security solutions, data breaches, or serious…

  • Sometimes, You Need to Call the Professionals

    by Rook Security on December 8, 2015

    Implementing a strong cybersecurity program requires IT security personnel that most companies don't have on staff. The reasons are many, including lack of funds and a lack of awareness of security needs. It's also tough to find qualified IT security professionals. It's a difficult job that involves working long hours, sometimes on holidays and weekends. A security operations center (SOC) analyst…

  • Introducing Weekend Reading

    by Jennifer Lawinski on December 4, 2015

    How many times have you come across an article that you'd love to read and found yourself closing the tab at the end of the day? Or saving it to Instapaper never to set eyes on it again? There's a lot of excellent news and analysis on information security, and we're experimenting with a new feature here at RSA Conference: Weekend Reading. On Friday afternoon, we'll post a roundup of some of the…

  • Reflections on RSA Conference 2015 Abu Dhabi

    by RSAC Contributor on December 3, 2015

    RSA Conference goes to the Middle East for the first time with RSA Conference 2015 Abu Dhabi. Rashed Al Oraimi, lead technologist at Booz Allen Hamilton, provided the following report. It was the last working day of the week in Abu Dhabi, and most of us were planning our weekends with family, yet the floors at Emirate Palace hotel were jam-packed with computer security professionals and companies…

  • Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies

    by Ben Rothke on September 19, 2015

    The legal field is always catching up to advances in technology. Once of the many examples is the Digital Millennium Copyright Act (DMCA), which only went into effect in 1998. About 7 years after the creation of the world wide web. In Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies, author and attorney Brian Wassom provides a forward thinking approach to how…

  • Treat Yourself to a SPA, Not a Pen Test

    by Rook Security on August 27, 2015

    A lot of companies are asked to do a pen test by their clients, because they think a pen test will let them know if their business partner’s technology is “secure” against cyber threats. The scan happens. The areas that need to be fixed are fixed. And the client feels warm and fuzzy inside. However, this feeling is misleading as the company isn't necessarily more secure— all it says is that you…

  • Cloud Computing Design Patterns

    by Ben Rothke on July 13, 2015

    Far too many technology books take a Hamburger Helper approach, where the first part of the book is about an introduction to the topic with filler at the end with numerous appendices of publicly available information. These books end up being well over 800 pages without a lot of original information, even though they are written an advanced audience. In software engineering, a design pattern is a…

  • RSAC Reflects Changes in Industry Attitudes, Focus

    by Tony Kontzer on April 22, 2015

    This is my fourth RSA Conference, which doesn't exactly make me a cagey old veteran, but it's just enough history to have a sense of how the gathering has changed in recent years. (All of you who've been coming since the 1990s should probably stop reading before you start snickering derisively like those two old dudes from the balcony on The Muppet Show.) The changes from my first RSAC in 2010 are…

  • Enterprise Software Security: A Confluence of Disciplines

    by Ben Rothke on January 15, 2015

    To date, most software security books have focused solely on writing secure code and educating developers on how to do that. In Enterprise Software Security: A Confluence of Disciplines, authors Kenneth van Wyk, Mark Graff, Dan Peters and Diana Burley take a different, and ultimately necessary approach. Their tactic is that treating software security as an autonomous discipline doesn’t work. With…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 30 Apr 2016 20:27:27 -0400.
© 2016 EMC Corporation. All rights reserved.