Showing Blog Posts: 1–10 of 1034

  • Detecting Attacks Takes More Than Just Having the Latest Tools

    by Gib Sorebo on April 27, 2016

    In this fascinating Peer2 Peer session How Do You Detect Attacks? participants representing enterprise customers, product vendors, and service providers all weighed in on some of the challenges they face detecting attacks. Many were monitoring their networks 24/7 with either in-house staff or managed security services providers. While there was some critique of the products they used and their…

  • Hacking for Dummies: Fifth Edition

    by Ben Rothke on April 26, 2016

    I’ve enjoyed Kevin Beaver’s Hacking for Dummies series for over a decade. The first edition came out in 2004 and I reviewed the four th edition here. Now in its fif th edition, the books 22 chapters progress from the basics of security to the hardening of an operating system, to the hacking of Web applications and more. The new edition covers Windows 10 and Linux, and includes a number of more…

  • Continuing the Conversation: Information Security Professionals in Higher Education

    by RSAC Contributor on April 25, 2016

    By Joanna Grama, Director of Cybersecurity and IT GRC Programs, EDUCAUSE When information security professionals get together, there is no shortage of conversation. From sharing points-of-view on the latest hot topic to swapping technology implementation tips, information security professionals are determined to learn from one another to advance the profession. This shared commitment to improving…

  • Enterprise Security Concerns for Consumer IoT Devices

    by RSAC Contributor on April 22, 2016

    By Andrew Hay, CISO, DataGravity “What are the security implications of consumer Internet of Things (IoT) devices being introduced into modern business environments and how to you protect your organization as a result?” At RSA 2016 I was able to pose this question to a full room of business executives, IT architects, and security analysts who were responsible for dealing with this very real…

  • How to Strike a Balance Between Disruption and Compliance

    by RSAC Contributor on April 20, 2016

    By Joanna Belbey, Social Media and Compliance Specialist, Actiance Unicorn startups are praised for revolutionizing regulated industries with new technologies, but does disruption come with a cost? When companies, especially those in controlled industries like financial services, healthcare, pharmaceuticals and the public sector, challenge the status quo, they risk facing the consequences of not…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • 11 Strategies to Consider in Addressing the Cybersecurity Skill Shortage

    by RSAC Contributor on April 18, 2016

    By Alberto Yépez, managing director of early stage venture capital firm Trident Capital Cybersecurity The cybersecurity industry has a talent shortage, yet not many realize just how severe it is. And, more importantly, they don’t realize what corporations struggling with the problem must do to get a grip on it. To solve the challenge, corporations must develop new hiring and training strategies…

  • Executive Hotel Rooms Are a Hacker’s Treasure Chest

    by Dale "Woody" Wooden on April 15, 2016

    The flight was long, and all you want to do now is get to your room, have a drink, and go to sleep. You sit down at the desk in your room, log onto the hotel’s Wi-Fi and log into your email. This is about the time your phone beeps. It’s almost dead. Luckily, your room has a charging station right on the desk… How convenient! The iPod needs to be charged too, so it is slipped into the hotel’s…

  • Peers Talk Application, Network, and Infrastructure Vulnerability Management at RSAC 2016

    by RSAC Contributor on April 14, 2016

    By Dan Cornell, CTO, Denim Group I had the opportunity to lead a Peer2Peer session at RSAC 2016 that asked attendees to talk about how they do vulnerability management for different types of vulnerabilities. In particular, what I wanted to discuss were the similarities and differences in how organizations deal with network and infrastructure vulnerabilities versus application-level vulnerabilities. …

  • Dark Territory: The Secret History of Cyber War

    by Ben Rothke on April 13, 2016

    With a catchy title of Dark Territory: The Secret History of Cyber War, (Simon & Schuster ISBN 9781476763255), this new book by Pulitzer Prize winning author Fred Kaplan looked to be a winner. Not that it’s not a good book; but for anyone who’s been involved with information security and cyberwarfare, most of the stories are already known and have long been covered. The book gets it title based on…

This document was retrieved from on Fri, 29 Apr 2016 00:04:48 -0400.
© 2016 EMC Corporation. All rights reserved.