Showing Blog Posts: 41–50 of 1036

  • Up Close and Personal with Actor, Activist Sean Penn at RSAC 2016

    by David Needle on March 4, 2016

    The RSA Conference wrapped up Friday with an onstage keynote interview with two-time Academy Award winning actor and activist Sean Penn. During an on stage conversation with RSA Program Director Hugh Thompson, Penn shared some insights into his acting career, what drives his activism, and his relationship with technology. On that last point, Penn jokingly suggested during the interview that…

  • Palo Alto Networks CEO ‘Next Gen Security Solutions Must Restore Trust’

    by David Needle on March 3, 2016

    Mark McLaughlin, CEO of Palo Alto Networks, said traditional approaches to computer security are doomed to fail or at least fall well short of providing the kind of broad protection and prevention today’s enterprises need. Speaking on “The (Inevitable?) Decline of the Digital Age” at the RSA conference, McLaughlin said new, more comprehensive preventative measures are needed to battle cyber…

  • Technology Takes a Backseat to Storytelling in StoryCorps Keynote

    by David Needle on March 3, 2016

    Dave Isay knows how to deliver bad news: Start with a compliment. “You are all working at a blistering pace to protect our lives,” Isay told the packed hall of security pros at the RSA Conference Wednesday afternoon. Then he added, “The next hour has nothing to do with cybersecurity.” You might think that would elicit groans at a security conference, but the crowd laughed and applauded with…

  • CISOs Share Tales From the Trenches at RSA Conference 2016

    by Tony Kontzer on March 3, 2016

    There are many themes that stretch across the information security world, but most organizations face their own particular challenges that require customized approaches. This was the clear takeaway from a well-attended panel at the RSA Conference Thursday, Lessons Learned from Real-World CISOs, during which CISOs from the medical device, education, health insurance and consumer goods sectors…

  • How Law Enforcement Agencies Fight Cyber Crime

    by Tony Kontzer on March 3, 2016

    Information security professionals have a plethora of technological tools at their disposal to fight would-be attackers—and more are on the way. The traditional prevention, detection and response technologies are soon to be augmented by innovative new tools that can do things such as spoof entire network topographies on the fly to deceive attackers. Yet a panel of federal law enforcement…

  • How a Security CEO Fell Prey to Scammers (Almost)

    by David Needle on March 3, 2016

    Having a security breach is one of every company’s worst nightmares. But the bad guys don’t just try to compromise your computer systems, they also use social manipulation and phony email addresses and domains to try and steal information and funds from right out from under your nose. That’s exactly what happened two years ago to Tom Kemp, CEO of cloud security firm Centrify. And the problem has…

  • Dispatches from the RSA Conference Expo Floor

    by Tony Kontzer on March 3, 2016

    I have trolled through many a conference exhibition hall in search of stories and swag for my kids, and there are always surprises waiting. I've played military "games," watched jugglers, and even had a conversation with a robot at past events. But I have never seen so many creative efforts at drawing eyeballs to a conference booth than at this year's RSA Conference in San Francisco. RSAC has…

  • How Do Google, Microsoft and Adobe Think About Privacy?

    by Tony Kontzer on March 2, 2016

    You may have noticed that privacy has become sort of a big deal of late. From Apple's battle with the FBI to ongoing work on developing an international privacy regulation, privacy issues have taken center stage, right next to the plethora of security challenges companies face. At the RSA Conference on Tuesday, a panel of privacy executives from Microsoft, Google and Adobe took on the topic, and…

  • How Hacker High School is Training the Tech Pros of Tomorrow

    by David Needle on March 2, 2016

    Hacking gets a bad rap. That’s the view of Pete Herzog, Managing Director of ISECOM, the non-profit Institute for Security and Open Methodologies, who spoke on attracting a new generation of cybersecurity professionals at the RSA Conference Wednesday. Herzog highlighted a series of high profile cyber break-ins reported in the news as attacks by hackers. For example, the headline “Man Hacks Monitor, …

  • Streamline the Cloud: How Companies Use Cloud Access Security Brokers

    by Tony Kontzer on March 2, 2016

    Growing numbers of information security executives are learning just how expansive their organizations' use of cloud computing are. And let's just say the findings are often shocking. With many companies unknowingly using thousands of cloud services, it's no wonder they're turning in larger numbers to cloud access security brokers. CASBs, as they're referred to, are essentially security…

This document was retrieved from on Mon, 02 May 2016 08:35:51 -0400.
© 2016 EMC Corporation. All rights reserved.