Menu

Blogs

Showing Blog Posts: 1–10 of 842

  • How Not To Be Hacked: The Definitive Guide for Regular People

    by Ben Rothke on July 30, 2015

    The Advanced Encryption Standard (AES), also known as Rijndael, is susceptible to brute forces attacks. Mohit Arora of Freescale Semiconductor wrote in 2012 that it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. No one ever said brute force had to be quick. For those that don’t have a billion billion years, the alternative is to bypass the cryptography…

  • Security Program Governance & Application Security Domains

    by RSAC Contributor on July 28, 2015

    This is the last in a three-part series on IT security from Forsythe Technology. This post looks at governance and application security. Previous posts covered core infrastructure and threat and vulnerability management and data protection and identity and access management. Innovating Your Security Mindset In the previous post, I talked about the role data protection and identity and access…

  • Practice Security Like Your Job Depends on It (Because It Does)

    by Tony Bradley on July 27, 2015

    For those who work in information security it’s hard to imagine not viewing the world through that lens. The fact of the matter, though, is that the vast majority of users don’t really give security a second thought. Unfortunately, that cavalier attitude could affect the company and possibly even cost those people their jobs. Many workers are just there to do their jobs. They assume that IT and…

  • RSA Conference APJ 2015 Ends With Call to Change the World

    by Fahmida Y. Rashid on July 24, 2015

    In life, there is always room for improvement, and that holds true for how people live, work, and interact. The last day of RSA Conference Asia Pacific & Japan 2015 reiterated that message through sessions, Expo floor, and keynotes. Organizations—and individual professionals—can improve how they operate internally and how they engage as part of a globalized society. Security professionals can—and…

  • Data Protection and Identity and Access Management Domains

    by RSAC Contributor on July 24, 2015

    This is the second in a three-part series on IT security from Forsythe Technology. This post looks at data protection and identity and access management. Other posts covered core infrastructure and threat and vulnerability management and governance and application security. Your Data Has Left the Building: Are You Protecting It? In the previous post, I talked about the current role of perimeter and…

  • RSA Conference Asia Pacific Japan Friday Preview

    by Fahmida Y. Rashid on July 24, 2015

    There are 28 sessions to choose from on the final day of RSA Conference Asia Pacific & Japan 2015. While the first day of sessions offered a lot of region-specific content, the second is more general. Instead of being region-specific, the sessions are more strategic, providing insights on specific topics. Mobile payments is a popular topic, but it is a concept with a lot of traction in Asia. Many…

  • Mobile Security Start Up SODA Wins Innovation Sandbox Contest at RSAC APJ

    by Fahmida Y. Rashid on July 23, 2015

    Singapore-based startup Soda won the most innovative start up crown at the conclusion of the RSA Conference Asia Pacific & Japan 2015 Innovation Sandbox Most Innovative Start Up competition on Tuesday. The competition was a precursor to the actual conference, which officially began Wednesday. Soda provides security infrastructure for mobile communications, offering encryption via a software layer…

  • RSA Conference Asia Pacific Japan 2015, Thursday Recap

    by Fahmida Y. Rashid on July 23, 2015

    Day Two of RSA Conference Asia Pacific & Japan was jam-packed. With 33 sessions, three keynotes, and a busy Expo floor, there were plenty of opportunities to learn, meet with vendors and clients, and network with like-minded peers from around the region. Several morning sessions focused on the Asia-Pacific region’s threat landscape. IBM Security’s George Tubin described how the Dyre malware family…

  • RSA Conference Asia Pacific Japan Sessions Thursday Preview

    by Fahmida Y. Rashid on July 23, 2015

    RSA Conference Asia Pacific Japan 2015 kicks off its first day of sessions Thursday morning. These speakers and sessions have been carefully curated because they provide a regional perspective to major security issues facing the Asia-Pacific region. There are plenty of sessions providing strategic security insights, such as Zulfikar Ramzan discussing strategic incident response planning in You’ve…

  • RSA Conference Asia Pacific Japan 2015: Wednesday Recap

    by Fahmida Y. Rashid on July 22, 2015

    Day One of RSA Conference Asia Pacific Japan 2015 began with the opening of the Expo floor. Show attendees walked around the floor, listening to vendor representatives demonstrate their solutions and asking questions about specific tools. The hum of conversation was steady throughout the day. The conference theme this year, change, highlights the evolution of security mindset. Change can be an…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 30 Jul 2015 08:08:02 -0400.
© 2015 EMC Corporation. All rights reserved.