Showing Blog Posts: 1–10 of 717

  • Catching Up With Cyphort's Marion Marschalek

    by Fahmida Y. Rashid on March 4, 2015

    Marion Marschalek, a threat researcher with Cyphort, spoke at both RSA Conference 2014 in San Francisco and RSA Conference APJ 2014 in Singapore. In this Q&A she talks about what excites her about information security and how she got to where she is today. RSA Conference: Can you provide some background on how you got into the security industry and how you ended up where you are today? Marschalek:…

  • Security Awareness Training: We're Doing it Wrong!

    by Rook Security on March 3, 2015

    This post comes from Arlie Hartman, a senior security advisor at Rook Security. It’s a relentless mantra in information security community: “People are the weakest link.” The success of email phishing, watering hole attacks, and over-the-phone social engineering tactics proves that attackers just have to target people in order to sidestep several layers of defense in depth measures. Most security…

  • InfoSec Conversations With Your People, Partners

    by Fahmida Y. Rashid on March 2, 2015

    Let's talk about what we've done so far this year. You have projects for making your organization more secure. You probably already dealt with some fires. You are also having regular conversations about security with your executives, users, and the board. Are you talking with your suppliers? We've seen over the past few months how attackers can come at you by targeting suppliers. Organizations…

  • My First RSA Conference: Exciting Professional Diversity and a Pinch of Fear

    by Rita S. Heims on February 26, 2015

    My good friend Jon Stanley invited me to speak on his panel at RSAC 2015. This will be my first time at the conference, let alone as a speaker. Over the past two decades as a lawyer and law professor, I’ve been to plenty of conferences: grand ones organized by professional membership associations with fancy keynotes speakers and high production value; little academic ones where only the twenty…

  • RSA Conference Proudly Expands Into Abu Dhabi!

    by Linda Gray on February 25, 2015

    With RSA Conference 2015 just around the corner in San Francisco, we are hearing a lot of excitement and feedback from our community regarding new session formats such as the crowdsourced track and our revamped Sandbox with various experiential learning opportunities. However, if you thought we were focusing only on US content, you’re wrong! After seeing a record number of attendees at last year's…

  • Quick Chat With Skycure's Adi Sharabani

    by Fahmida Y. Rashid on February 24, 2015

    Adi Sharabani, CEO and co-founder of mobile security company Skycure, spoke about threats on mobile devices at RSA Conference APJ 2014 in Singapore. In this Q&A he talks about what excites him about information security and how he got to where he is today. RSA Conference: Can you provide some background on how you got into the security industry and how you ended up where you are today? Sharabani: As…

  • Catching Up With Innovation Sandbox Winners: RedOwl Analytics

    by Fahmida Y. Rashid on February 23, 2015

    For 10 years RSA Conference has highlighted companies with innovative information security products as part of its Innovation Sandbox Contest. Who will we see competing this year? Ten companies go head-to-head on the Innovation Sandbox stage at RSA Conference to nab the "Most Innovative Company at RSA Conference" title. Teams from each company present and demonstrate their product in front of a…

  • Working With Government: Privacy

    by Todd Inskeep on February 20, 2015

    This is the fourth post in a multi-part series about how the information security community needs to engage with the government to shape laws which will affect the industry. You can see the first, second, and third posts here. The President’s State of the Union addressed the need for increased cybersecurity investment, new laws, and even the issue of privacy for ourselves and our children. Since…

  • Working With Government: Legal Authority and Law

    by Todd Inskeep on February 18, 2015

    This is the third post in a multi-part series. You can read the first and second parts here. A second major aspect of the current National Cyber Security call for action considers the legal authority to investigate and prosecute cyber-crimes. We also need to agree what would be the appropriate role for law enforcement authorities. There are differing views on whether the Computer Fraud and Abuse Act…

  • An Anthem to Get Behind: Enable Two-Factor Authentication

    by Eric Cowperthwaite on February 17, 2015

    In the security industry, we all know it’s just a matter of time, sometimes minutes, before the next breach makes headlines. We’re stopping and blocking attacks left and right, and it only takes that one time for a hacker to be right, that one mistake before we have to answer the question, “What happened?” The latest victim was Anthem, a huge health insurance provider who had 80 million customer…

This document was retrieved from on Fri, 06 Mar 2015 15:02:32 -0500.
© 2015 EMC Corporation. All rights reserved.