Showing Blog Posts: 11–20 of 841

  • RSA Conference Opening Day: Expo Floor and Keynotes

    by Fahmida Y. Rashid on July 22, 2015

    RSA Conference officially opens in the afternoon on Wednesday, July 22 with the keynote speech by Amit Yoran, president of RSA Security. However, the Expo floor opens in the morning, and this is the best opportunity you will have this week to explore. Discover new products and solutions from leading vendors in the information security industry, participate in hands-on demos, and attend 20-min…

  • Innovation Sandbox Contest Returns to RSA Conference APJ 2015

    by Fahmida Y. Rashid on July 21, 2015

    While the RSA Conference Asia-Pacific and Japan 2015 starts with the keynotes on Wednesday, July 22, there are plenty of events on Tuesday, including the CSA Summit and Innovation Sandbox. Innovation is a popular word, especially in security circles. Everyone thinks their approach to solving a security problem is the right way to fix the problems plaguing the industry. Who doesn’t want to stand out…

  • Cloud Security at RSA Conference 2015 APJ

    by Fahmida Y. Rashid on July 20, 2015

    RSA Conference Asia-Pacific kicks of this week in Singapore. Last month, RSA Security’s Zulfikar Ramzan and Jim Reavis, the CEO of the Cloud Security Alliance, dug into the big questions surrounding cloud security during a TweetChat. Some of the topics discussed during the chat will also be part of the conversation at RSA Conference in Singapore. There will be a number of sessions at RSA Conference…

  • Security 2.0: Survival in the New Threatscape

    by RSAC Contributor on July 20, 2015

    This is the first in a three-part series on IT security from Forsythe Technology. This post looks at core infrastructure and threat and vulnerability management. Security breaches are inevitable. Organizations needs to shift from aging mindsets and predictable tools to comprehensive prevention, detection and response capabilities in order to neutralize potential damage. In this blog series, we’ll…

  • Don’t Make the Mistake of Being the Low-Hanging Fruit

    by Tony Bradley on July 17, 2015

    Attackers are typically lazy and many attacks are automated. If you’re an easy target, you will inevitably get breached. You’ve probably heard somebody say something to the effect that they don’t worry too much about security because they don’t have any data of value or interest. Maybe you’ve even said that your business. Unfortunately, that isn’t how attacker logic works. The mistake in this…

  • Peers Discuss Risks in the Payments World

    by RSAC Contributor on July 16, 2015

    Mike Vergara, vice-president of consumer risk management at PayPal led 25 security and risk professionals in a discussion about risk in the payments world as part of the Peer-to-Peer discussion at RSA Conference 2015 in San Francisco. Below is Vergara's notes from the session. The attendees of Misconceptions of Risk in the Payments World provided a lively discussion and we all came away with new…

  • Automobile Industry Joins ISAC Party

    by Fahmida Y. Rashid on July 15, 2015

    The automobile industry’s new intelligence sharing and analysis center (ISAC) will let automakers exchange threat information to better secure vehicles. The announcement comes amidst growing concerns over vehicular safety. Self-driving cars aren’t the only targets, as all the automation systems and controls in passenger cars are increasingly networked. More than 60 percent of all new vehicles by…

  • The Modern Sherlock Holmes of the Cyber World is in Silicon Valley

    by RSAC Contributor on July 14, 2015

    Media Contributor – Interview by Kema (Rajandran) Johnson, a correspondent with Australian Security Magazine It’s no secret that information is power and it’s this notion that has sustained the initial interest in cyber forensics for young Security Engineer, Prima Virani. With an interest in information security and forensics from an early age, Ms Virani was drawn to the cyber security domain, …

  • Cloud Computing Design Patterns

    by Ben Rothke on July 13, 2015

    Far too many technology books take a Hamburger Helper approach, where the first part of the book is about an introduction to the topic with filler at the end with numerous appendices of publicly available information. These books end up being well over 800 pages without a lot of original information, even though they are written an advanced audience. In software engineering, a design pattern is a…

  • Hacking as a Competitive Sport, In Sports

    by Rook Security on July 10, 2015

    Recently we witnessed a rookie’s debut into the world of the breached–the MLB’s Houston Astros. With St. Louis Cardinals management now acknowledging its role in the attack to obtain operational information, it is a fascinating development for a number of reasons. Millions of credit cards stolen from a retailer? Been there, done that. Data on professional sports teams being illegally accessed?…

This document was retrieved from on Thu, 30 Jul 2015 04:13:39 -0400.
© 2015 EMC Corporation. All rights reserved.