Blogs

Showing Blog Posts: 1–10 of 566

  • Robust Security Intelligence: How Different Security Infrastructures Measure Up

    by Christopher Burgess on July 25, 2014

    What constitutes good security infrastructure? Ask a member of a security vendor's sales team, and he might hand you an order book with all the boxes checked. Ask a consultant, and her solution might focus on an extended hand-holding engagement. Ask a member of a country's cybersecurity emergency response team (CERT), and he will talk about national infrastructure and public-private partnerships. …

  • Upping the Ante: Security in Mobile Health Care Devices

    by John Linkous on July 24, 2014

    You might wonder what mobile healthcare has to do with Stuxnet. A few years ago when the Stuxnet malware first hit, a client asked me to provide an overview of why it was different than the other malware that came before it. At the time, my first inclination was to do exactly that: write up a nice, brief assessment of how Stuxnet was the first tangible evidence of malware affecting "real world"…

  • RSA Conference APJ Day 2 Recap

    by Linda Gray on July 23, 2014

    Professor Andy McAfee, the renowned MIT fellow, kicked off this morning’s keynotes to a full room of intrigued listeners. He really is an engaging speaker with a compelling style and perspective……he even got the audience playing “Jeopardy”. Speakers from Splunk, Qualys and Cisco followed, before the Exhibition opened and track sessions kicked-off. Like yesterday, the Exhibition was jam-packed, with…

  • Security Awareness: Applying Practical Security in Your World

    by Ben Rothke on July 22, 2014

    Security awareness is a vital part of information security. Just how important is it? In September, the 10-day SANS Security Awareness Summit 2014 will cover every aspect of the topic. For those that want to get an appreciation for the topic but can’t make it to Dallas for the Summit, Security Awareness: Applying Practical Security in Your World is a good resource for the reader that wants both an…

  • RSA Conference APJ Day 1 Recap

    by Linda Gray on July 22, 2014

    What an exciting start to RSA Conference Asia Pacific & Japan 2014! The second annual RSA® Conference Asia Pacific & Japan 2014 kicked-off with a bang! We are pleased to have introduced a pre-conference day this year bringing additional learning experiences to our attendees. Yesterday we hosted a SANS tutorial on Digital Forensics & Incident Response along with the inaugural “Most Innovative Company”…

  • Mobile Payments and Devices Under Attack

    by Christopher Burgess on July 21, 2014

    A number of annual security reports released in the first half of 2014 address the threat to mobile devices and capabilities, including mobile payments and banking. If you are an Android user, you will find it interesting these reports estimated 98 to 99 percent of all mobile malware created in 2013 targeted Android devices (see, for example, the Cisco 2014 Annual Security Report and the Kaspersky…

  • Welcome to RSA Conference Asia Pacific & Japan 2014!

    by Linda Gray on July 20, 2014

    We are very excited to welcome you to the second annual RSA ® Conference Asia Pacific & Japan 2014 being held in Singapore at the Marina Bay Sands! As you know, the event is taking place this Tuesday and Wednesday (22- 23 July), with a pre-Conference day beginning today, 21 st July. To help you navigate the conference and ensure you have an enjoyable experience, please review the important…

  • Supply Chain Security: What It Means on a Global Level

    by John Linkous on July 18, 2014

    Take a good, long look at your smartphone. While there is a big vendor name on the outside, if you were to open up its case, you would find several other vendor labels on various components: capacitive touchscreens; video and audio ASICs; Bluetooth and WiFi hardware; and individual capacitors, resistors, and other electronics gear building blocks, to name just a few, all of which are manufactured…

  • Incident Response: Is the House Really on Fire?

    by Christopher Burgess on July 16, 2014

    The comparison of incident response teams to fire departments has been around for many years, with well-funded entities within enterprises likened to professional fire departments in a large city and the less-funded teams within small-medium businesses (SMBs) likened to volunteer fire departments found in smaller communities. The difference between the well-funded and volunteer teams can be…

  • The Challenge of Mobile Forensics

    by John Linkous on July 14, 2014

    At RSA Conference 2014 in San Francisco, Andrew Hoog and the viaForensics, Inc., team presented "Mobile Analysis Kung Fu, Santoku Style." A highly informative presentation, Andrew and a viaForensics engineer, Sebastian Selma, gave a thorough overview of the mobile device security black art of forensics. While the practice of data forensics is difficult enough on a desktop or laptop computer, …

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 25 Jul 2014 02:44:14 -0400.
© 2014 EMC Corporation. All rights reserved.