Menu

Blogs

Showing Blog Posts: 11–20 of 662

  • What's in Your Privacy Policy?

    by Christopher Burgess on December 4, 2014

    The days of asking "Why do I need an entire policy about privacy?" are long gone. Users regularly evaluate the trade-off between how their information is being used and the cost to personal privacy. Every company needs to be upfront about how user data is being used, shared, and stored. What Does a Privacy Policy Look Like? A quick survey of well-known companies and their respective privacy…

  • New Standards and Protocols Introduce Wireless Security Threats

    by John Linkous on December 3, 2014

    When I hear the term "wireless security," the first thing I think of is my 802.11 Wi-Fi-enabled router, humming along with WPA2 (and Wi-Fi Protected Setup disabled, naturally). There is a relatively low risk that anyone will be able to get to my data—at least until it routes to the Internet. What I—like many of you, probably—tend to forget about are the other, lesser known protocols and standards…

  • Keeping the Lights On, Networks Safe

    by Fahmida Y. Rashid on December 1, 2014

    December is a month for looking back at all the things that happened this year and for looking ahead to what is in store next year. For many information security professionals, it is also a month of long hours as organizations rely on skeleton staff to defend the network. Criminals frequently launch their campaigns over holidays, weekends, and late at night when IT staff has a skeleton crew in…

  • Latest Guidelines for Malware Detection

    by Robert Moskowitz on November 28, 2014

    Today's malware brings a wide range of threats that—without proper detection and defense—can wreak havoc on any computer system. While various kinds of malware can get onto your system via the original manufacturer, information-seeking government agencies, and covert infiltrators, the vast majority of malware still comes over the Internet as software downloads. Deceptive Downloads Because a…

  • Public or Private Cloud: How Secure Is Your Cloud?

    by Christopher Burgess on November 27, 2014

    Public and private cloud service providers have many providers to choose from. The cloud offers low-cost data storage solutions and infrastructure to host web applications and processes. The company can remove applications from client-side devices and they don’t need skilled IT professionals to manage the infrastructure. In a September Forbes article, "How to Avoid a Cloud Strategy Fail,"…

  • Bulletproof SSL and TLS

    by Ben Rothke on November 24, 2014

    If SSL is the emperor’s new clothes, then Ivan Ristic in Bulletproof SSL and TLS has shown that perhaps the emperor isn't wearing anything at all. There is a perception that if a web site is SSL secured, then it’s indeed secure. Read a few pages in this important book, and the SSL = security myth is dispelled. For the first 8 of the 16 chapters, Ristic, one of the greatest practical SSL./TLS…

  • Network Intrusion: NIDS and Detection

    by Robert Moskowitz on November 24, 2014

    Network intrusions—any unauthorized activity on a computer network—utilize network resources that can be better used for other, authorized, purposes. They threaten the security of the network and data. There are a variety of ways to detect an intrusion, including monitoring network logs, sniffing network traffic, and real-time filtering for specific network events. At a minimum, network security…

  • Which Is It: Privacy vs. Security, or Privacy and Security?

    by Christopher Burgess on November 21, 2014

    The age-old question: is it "privacy vs. security" or "privacy and security"? This year, we’ve seen data breach after data breach affecting companies of all sizes and across all industries. We’ve also seen victims grapple with privacy headaches in the aftermath. It would seem, then, that security and privacy are intertwined. But when considering the users and how they interact with company data, …

  • Registration is Now OPEN for RSA Conference 2015!

    by Linda Gray on November 20, 2014

    The holidays are fast approaching and that means another year has flown by. For everyone here at RSA Conference, that also means it’s crunch time as we prepare for the 2015 event. With that, we’re excited to announce registration for RSA Conference 2015 is now open! Be sure to mark your calendars – this year’s event is April 20-24 at our usual location in San Francisco’s Moscone Center. Each year, …

  • Guidelines For Retailers This Holiday Shopping Season

    by Fahmida Y. Rashid on November 19, 2014

    The holiday shopping season is looming, and retailers are gearing up for Black Friday and other sales. It's been a year since criminals infiltrated Target's networks with malware and made off with millions of credit card details. Retailers are scrambling to get everything ready for the shoppers and deals; we hope their networks are secure and ready, as well. Or will cyber-criminals have another…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 22 Dec 2014 06:20:42 -0500.
© 2014 EMC Corporation. All rights reserved.