Menu

Blogs

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    Leading image

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s Treasure Chest: Woody Wooden takes a look at the ways in which malicious hackers can steal your…

  • World Password Day 2016: How Do You Manage Your Passwords?

    by Jennifer Lawinski on May 5, 2016

    I recently signed up for the TSA Global Entry Pre-Check program, because as I'm going to be traveling for RSA Conference, I'll be spending quality time at JFK for more than just vacations. Why is this information I'm sharing with you on World Password Day 2016? Just two days after I created my account on the government's site, I was notified via email that there was a change in my application…

  • Peers Explore Retail Cybersecurity, Metrics and Fraud Prevention

    by RSAC Contributor on May 4, 2016

    By Steve Winterfeld, Director of Cybersecurity, Nordstrom The session Integrating Retail Cybersecurity, Loss Prevention, Risk, Fraud and Privacy had a very engaged team. We had active participation from Fortune 10 retailers, major banks, the health industry and vendors. Our discussion focused on what companies are doing to integrate functions including cybersecurity, loss prevention, risk, fraud, …

  • Breakthroughs in Decision Science and Risk Analysis

    by Ben Rothke on May 3, 2016

    Decision and risk analysis is the discipline comprising the philosophy, theory, methodology, and professional practice necessary to address important decisions in a formal manner. Decision analysis includes many procedures, methods, and tools for identifying, clearly representing, and formally assessing important aspects of a decision, for prescribing a recommended course of action by applying…

  • Hadoop Security: Protecting Your Big Data Platform

    by Ben Rothke on May 2, 2016

    As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices. When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop. …

  • Avoid Ransomware Attacks by Removing Attack Vectors

    by Rook Security on April 29, 2016

    To date, there are around about 54 different versions of ransomware, and each one has multiple variants. Every day there is a new ransomware victim, and unlike other malware that has come before, ransomware isn’t looking to steal your information or gain unauthorized access. It just wants your money. Should I pay? Can my files be decrypted? How did this happen? These questions get asked a lot…

  • Detecting Attacks Takes More Than Just Having the Latest Tools

    by Gib Sorebo on April 27, 2016

    In this fascinating Peer2 Peer session How Do You Detect Attacks? participants representing enterprise customers, product vendors, and service providers all weighed in on some of the challenges they face detecting attacks. Many were monitoring their networks 24/7 with either in-house staff or managed security services providers. While there was some critique of the products they used and their…

  • Hacking for Dummies: Fifth Edition

    by Ben Rothke on April 26, 2016

    I’ve enjoyed Kevin Beaver’s Hacking for Dummies series for over a decade. The first edition came out in 2004 and I reviewed the four th edition here. Now in its fif th edition, the books 22 chapters progress from the basics of security to the hardening of an operating system, to the hacking of Web applications and more. The new edition covers Windows 10 and Linux, and includes a number of more…

  • Continuing the Conversation: Information Security Professionals in Higher Education

    by RSAC Contributor on April 25, 2016

    By Joanna Grama, Director of Cybersecurity and IT GRC Programs, EDUCAUSE When information security professionals get together, there is no shortage of conversation. From sharing points-of-view on the latest hot topic to swapping technology implementation tips, information security professionals are determined to learn from one another to advance the profession. This shared commitment to improving…

  • Enterprise Security Concerns for Consumer IoT Devices

    by RSAC Contributor on April 22, 2016

    By Andrew Hay, CISO, DataGravity “What are the security implications of consumer Internet of Things (IoT) devices being introduced into modern business environments and how to you protect your organization as a result?” At RSA 2016 I was able to pose this question to a full room of business executives, IT architects, and security analysts who were responsible for dealing with this very real…

  • How to Strike a Balance Between Disruption and Compliance

    by RSAC Contributor on April 20, 2016

    By Joanna Belbey, Social Media and Compliance Specialist, Actiance Unicorn startups are praised for revolutionizing regulated industries with new technologies, but does disruption come with a cost? When companies, especially those in controlled industries like financial services, healthcare, pharmaceuticals and the public sector, challenge the status quo, they risk facing the consequences of not…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 06 May 2016 20:27:28 -0400.
© 2016 EMC Corporation. All rights reserved.