Blogs

Showing Blog Posts: 21–30 of 598

  • Identity Management and the Cloud: It's Easier Than You Think

    by John Linkous on August 14, 2014

    How do you create an identity management cloud? Identity management (IDM) has in the past hovered on the periphery of information security. No longer. As organizations become more aware of the risks of not keeping track of users, what they access, and what privileges they have, identity management is moving to the forefront. And identity management is not just limited to the largest enterprises, …

  • Security Metrics: How Are You Measuring Security?

    by Joshua Marpet on August 12, 2014

    Do you have an information security practice? How do you measure its effectiveness? By the number of tickets generated? The number of viruses found and stamped out? Or by how quiet it is?—"If they don't bother me, they must be doing their job!" Have the security metrics guidelines changed in the last few years as infosec moved away from a helpdesk mentality, towards a penetration tester's…

  • Carry On: Sound Advice from Schneier on Security

    by Ben Rothke on August 11, 2014

    Bruce Schenier has been called an information security rock star. If that’s the case, then Carry On: Sound Advice from Schneier on Security is his greatest hits collection 2008-2013. The roughly 175 essays in the book represent a collection of articles Schneier wrote for this Crypto-Gram newsletter, his blog and other blogs, magazines, newspapers and other periodicals. Some of the articles, such…

  • No Easy Answer for In-App Data Security on Mobile Devices

    by John Linkous on August 7, 2014

    The proliferation of mobile devices—smartphones, tablets, convertibles, and more—is leading to a fundamental shift in how technology is used both for individuals and businesses. It's also leading to major problems for ensuring mobile security, especially inside of apps. App data is managed through Internet-connected, platform-specific programs for mobile devices, delivered through trusted app…

  • The Business of Security

    by Christopher Burgess on August 6, 2014

    Some of the most affable salespersons any of us have ever encountered are in the business of selling security. The business of security takes on many personas: technology, intelligence, awareness, knowledge, automation, hardware, software, legal, identity, BYOD, privacy, insider or outsider, risk and risk tolerance, and identity. At the recent RSA Conference 2014, many presentations touched one…

  • It's August; Let's Talk Budgets

    by Fahmida Y. Rashid on August 5, 2014

    The year's halfway mark has just passed, which for many information security professionals means it's time to think about the end of the year and plan for next year. This month, we will talk about what this halfway point means for current security initiatives and how they affect upcoming budget discussions. It's never too early to evaluate the status of existing projects and initiatives and to…

  • Introduction to Cyber-Warfare: A Multidisciplinary Approach

    by Ben Rothke on August 4, 2014

    Cyberwarfare is a most controversial topic. At the 2014 MISTI Infosec World Conference, noted security curmudgeon Marcus Ranum gave a talk on Cyberwar: Putting Civilian Infrastructure on the Front Lines, Again. Be it the topic or Marcus being Marcus, a third of the participants left within the first 15 minutes. They should have stayed, as Ranum, agree with him or not, provided some riveting…

  • Charity: Water Updates RSA Conference on Growing Nepal Efforts

    by Linda Gray on August 4, 2014

    At this year’s RSA Conference in San Francisco, we joined the charity: water mission asking our attendees to participate in a Waterwalk. In exchange for their participation, RSA Conference vowed to make a donation that would help fund two water projects for schools in Nepal. Join me for a chat with charity: water Growth Associate, Makena Cunningham, as we check in on the progress. At this year’s RSA…

  • A Comprehensive Cloud Strategy for Data Security

    by Robert Moskowitz on August 1, 2014

    As popular as cloud computing has become, and as fast as it continues to grow, it brings with it a whole new set of data security concerns. Without a robust cloud strategy for ensuring security capabilities, cloud computing has little strategic value, particularly since a single data breach can cost an organization far more than it has gained from the advantages of cloud-based data storage. …

  • Vulnerability Management Helps Law Enforcement Investigate Cybercrime

    by Christopher Burgess on July 30, 2014

    Have we had a day in recent memory when cybercrime was not part of the global news cycle? According to a newly released report from RSA, over 50 percent of phishing attacks in March 2014 targeted brands located in the United States, United Kingdom, India, Australia, and Canada; an April 2014 RSA report reviewing 2013 data noted phishing caused $5.9 billion in losses to global organizations that…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 18 Sep 2014 09:42:46 -0400.
© 2014 EMC Corporation. All rights reserved.