Blogs

Showing Blog Posts: 51–60 of 622

  • Introduction to Cyber-Warfare: A Multidisciplinary Approach

    by Ben Rothke on August 4, 2014

    Cyberwarfare is a most controversial topic. At the 2014 MISTI Infosec World Conference, noted security curmudgeon Marcus Ranum gave a talk on Cyberwar: Putting Civilian Infrastructure on the Front Lines, Again. Be it the topic or Marcus being Marcus, a third of the participants left within the first 15 minutes. They should have stayed, as Ranum, agree with him or not, provided some riveting…

  • Charity: Water Updates RSA Conference on Growing Nepal Efforts

    by Linda Gray on August 4, 2014

    At this year’s RSA Conference in San Francisco, we joined the charity: water mission asking our attendees to participate in a Waterwalk. In exchange for their participation, RSA Conference vowed to make a donation that would help fund two water projects for schools in Nepal. Join me for a chat with charity: water Growth Associate, Makena Cunningham, as we check in on the progress. At this year’s RSA…

  • A Comprehensive Cloud Strategy for Data Security

    by Robert Moskowitz on August 1, 2014

    As popular as cloud computing has become, and as fast as it continues to grow, it brings with it a whole new set of data security concerns. Without a robust cloud strategy for ensuring security capabilities, cloud computing has little strategic value, particularly since a single data breach can cost an organization far more than it has gained from the advantages of cloud-based data storage. …

  • Vulnerability Management Helps Law Enforcement Investigate Cybercrime

    by Christopher Burgess on July 30, 2014

    Have we had a day in recent memory when cybercrime was not part of the global news cycle? According to a newly released report from RSA, over 50 percent of phishing attacks in March 2014 targeted brands located in the United States, United Kingdom, India, Australia, and Canada; an April 2014 RSA report reviewing 2013 data noted phishing caused $5.9 billion in losses to global organizations that…

  • The Future Is Now: Threats That Were Never Supposed to Happen Are Here

    by John Linkous on July 29, 2014

    Recently, I took the opportunity to install the latest version of Pwnie Express's Pwn Pad 2014ce on my Google Nexus 7 tablet. For those who aren't familiar with the Pwn Pad, it's a modified version of the Kali Linux distribution that provides a complete, walking environment for detecting and—as a white-hat only, of course—testing information security threats. While the Pwn Pad is a great mobile…

  • Robust Security Intelligence: How Different Security Infrastructures Measure Up

    by Christopher Burgess on July 25, 2014

    What constitutes good security infrastructure? Ask a member of a security vendor's sales team, and he might hand you an order book with all the boxes checked. Ask a consultant, and her solution might focus on an extended hand-holding engagement. Ask a member of a country's cybersecurity emergency response team (CERT), and he will talk about national infrastructure and public-private partnerships. …

  • Can’t We Just Learn to Share?

    by Gib Sorebo on July 25, 2014

    It seems that lesson about sharing we all learned in kindergarten appears to be front and center in the debate about information sharing as it relates to cybersecurity vulnerabilities, threats, incidents, and who knows what else. In its perpetual desire to appear to be doing something about cybersecurity, Congress has once again embarked on another ill-fated effort to pass cybersecurity…

  • Upping the Ante: Security in Mobile Health Care Devices

    by John Linkous on July 24, 2014

    You might wonder what mobile healthcare has to do with Stuxnet. A few years ago when the Stuxnet malware first hit, a client asked me to provide an overview of why it was different than the other malware that came before it. At the time, my first inclination was to do exactly that: write up a nice, brief assessment of how Stuxnet was the first tangible evidence of malware affecting "real world"…

  • RSA Conference APJ Day 2 Recap

    by Linda Gray on July 23, 2014

    Professor Andy McAfee, the renowned MIT fellow, kicked off this morning’s keynotes to a full room of intrigued listeners. He really is an engaging speaker with a compelling style and perspective……he even got the audience playing “Jeopardy”. Speakers from Splunk, Qualys and Cisco followed, before the Exhibition opened and track sessions kicked-off. Like yesterday, the Exhibition was jam-packed, with…

  • Security Awareness: Applying Practical Security in Your World

    by Ben Rothke on July 22, 2014

    Security awareness is a vital part of information security. Just how important is it? In September, the 10-day SANS Security Awareness Summit 2014 will cover every aspect of the topic. For those that want to get an appreciation for the topic but can’t make it to Dallas for the Summit, Security Awareness: Applying Practical Security in Your World is a good resource for the reader that wants both an…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 22 Oct 2014 20:38:45 -0400.
© 2014 EMC Corporation. All rights reserved.