Showing Blog Posts: 21–30 of 900

  • How Windows 10 Tackles Enterprise Privacy

    by RSAC Contributor on October 20, 2015

    This post comes from Bogdan Botezatu, a security researcher with BitDefender. With Microsoft releasing the new Windows 10, privacy concerns came up while some of the new “telemetry” features were showcased. For consumers, this telemetry opt-in when you install can be summed up as an “improving customer satisfaction” feature. Still “Basic” Privacy for Windows 10 Users While all information is…

  • Why It Costs More to Protect Your Virtual Infrastructure

    by Tony Bradley on October 19, 2015

    Security incidents are expensive, but not all security incidents are created equally. A recent study found that businesses pay a significant premium for incident response and recovery affecting a virtual infrastructure. Respondents representing more than 5,500 different companies across 25 different countries participated in the survey. The purpose of the survey was to learn more about the cost of…

  • Securing Today’s Online Kids: A New Landscape

    by Lance Spitzner on October 15, 2015

    As a security professional, my passion is helping organizations around the world create more secure environments. As a father of three, that passion extends to kids. For National CyberSecurity Awareness Month (also now known as #CyberAware), I am working with RSA Conference on the CyberSafety: Kids initiative. On Oct. 28, I will talk about what we, as parents, can do to secure kids as part of the …

  • Taking Stock: Ranking the Next Billion-Dollar CyberSecurity Markets

    by RSAC Contributor on October 14, 2015

    This post in our VC-series comes from Venky Ganesan, managing director and cybersecurity investor of Menlo Ventures. With IT security spending estimated to crest the $75 billion annual mark before the end of 2015, there’s no shortage of emerging security sectors that will soon cross $1 billion in annual revenues. At the same time, with so many startups pursuing cybersecurity solutions, venture…

  • RSA Conference 2016 Introduces New Learning Opportunities for Small Group Engagement

    by Britta Glade on October 9, 2015

    RSA Conference 2016 promises to be an amazing experience for our attendees. Aside from all of the great things in store to help us celebrate our 25 th anniversary—and there are some fabulous things you will not want to miss!—we are planning to introduce several new opportunities and restructure some current ones in our educational lineup to help our attendees maximize their time and investment at…

  • Securing Today’s Online Kids

    by Lance Spitzner on October 7, 2015

    As a security professional, my passion is helping organizations around the world create more secure environments. As a father of three, that passion extends to kids, as well. As part of National Cyber Security Awareness Month (also now known as #CyberAware) I’m very excited to be part of RSA Conference’s CyberSafety: Kids program to help secure kids. As part of that initiative, I will be speaking…

  • Network Attacks and Exploitation: A Framework

    by Ben Rothke on October 2, 2015

    The phrase think like a hacker is bandied about incessantly. For most people, they can’t think like a hacker any more than they could think like a podiatrist or a CPA. With that, in Network Attacks and Exploitation: A Framework, (Wiley 978-1118987124), author Matthew Monte has written a great guide that while it won’t help you think like a hacker; it will provide you with the knowledge of how to…

  • RSA Conference Marks Cyber-Safety Awareness Month

    by RSAC Contributor on October 1, 2015

    Fall. Football season is in full swing. In Northeastern United States, the leaves are changing colors. Kids are back in school. And this October, RSA Conference is taking part in Cybersecurity Awareness month. As professionals, we talk about privacy and staying safe online every day, but the conversations tend to be in a business context. We discuss ways to make sure our systems are secure, our…

  • Insuring Cyber the Same Way as Natural Disasters

    by Rook Security on September 30, 2015

    There is no doubt that cyberinsurance is a fast-growing product with an important role in our current landscape where security breaches are happening at a breakneck pace. And many claim the market is nowhere near fully saturated...lots of companies remain unprotected. Most every Risk Manager has a disaster plan for what we typically think of as natural disasters: hurricane, fire, even polar…

  • How Much Will That Phishing Trip Cost You?

    by Tony Bradley on September 29, 2015

    Organizations spend a significant amount of money on security tools. All of the firewalls and antimalware solutions in the world, though, offer little protection against a phishing attack that tricks an authorized user into downloading malicious software or compromising credentials. Phishing attacks are becoming more effective and more costly as time goes on. The Ponemon Institute recently…

This document was retrieved from on Tue, 01 Dec 2015 16:56:59 -0500.
© 2015 EMC Corporation. All rights reserved.