Menu

Blogs

Showing Blog Posts: 1–10 of 60 by Tony Kontzer

Tony Kontzer

Tony Kontzer

RSA Conference

  • This Year's Innovation Sandbox Theme: Taking Humans out of the Security Equation

    by Tony Kontzer on April 17, 2018

    Kicking off the RSA Conference with the Innovation Sandbox event-within-an-event has always made a lot of sense. Attendees get an overview of what's coming next in security without having to feel like they have to jump into a deep dive right out of the gate. They get 10 three-minute presentations that delve into a host of security problems begging for better solutions. (The presenters also likely…

  • No Shortage of Compelling Topics as RSA Conference 2018 Approaches

    by Tony Kontzer on April 13, 2018

    Certain things in life are inevitable. Death and taxes. The sun rising in the East and setting in the West. Donald Trump tweeting extemporaneously. Kids growing up and leaving home (okay, so there's a little hope in that last one.) Here's another item to add to the list: Namely, that IT security and privacy professionals will get the goods when they attend the annual RSA Conference, which will…

  • New York Cybersecurity Regulations: An Important Step, but Still a Long Way From the GDPR

    by Tony Kontzer on March 29, 2018

    Leave it to New Yorkers to take a uniquely aggressive stand against cybercrime. Sure, the effort only protects one industry, but we have to start somewhere. As home to the world's greatest concentration of financial services firms, not to mention the most powerful stock exchanges on the planet, New York has a lot to protect. Which is why Gov. Andrew Cuomo in 2016 directed the state's Department…

  • NIST Cybersecurity Framework Getting a Facelift, Looking to Make Adoption Easier

    by Tony Kontzer on March 15, 2018

    One of the biggest obstacles to securing the nation's critical infrastructure components, as well as to securing enterprise environments, is poor coordination. Whether it's the lack of a common vocabulary, a lack of agreement about best practices and recommended methodologies, or simply seeing security through different lenses, it's clear that without a common playbook from which to collaborate, …

  • How Educational Institutions Are Failing to Adequately Protect Student Data

    by Tony Kontzer on February 28, 2018

    With security at the forefront of hot button issues across the country right now, one threat often gone unnoticed to students' well-being is the growing frequency with which their personal data is being compromised. Cyber criminals' increased interest in attacking education systems imperils students' financial futures and privacy, and gives parents a reason to question whether schools are up to…

  • Shift Left or Die: Baking Security into the Software Development Lifecycle is More Critical Than Ever

    by Tony Kontzer on February 27, 2018

    Somewhere along the road to DevOps nirvana that so many organizations have been attempting to follow, security got left behind. You see, a big driver of the need for DevOps is the speed with which organizations crank out software. It turns out it's really easy for software development to run off the rails, turning what should be innovation into unnecessary fiascos that can cost millions to fix, …

  • Federal Law Needed to Motivate Retailers and Others to Disclose Breach Details

    by Tony Kontzer on January 31, 2018

    The numbers provide a constant and disturbing reminder: T.J. Maxx, 2006, 94 million credit card numbers Heartland Payment Systems, 2009, 130 million credit card numbers Target, 2013, 40 million credit card numbers Home Depot, 2014, 50 million credit card numbers These are the biggest breaches we know have that have hit the retail industry but they're far from the only ones. In fact, IT security…

  • Congressional Votes on Controversial Surveillance Law Close Door on Privacy Debate—Or Do They?

    by Tony Kontzer on January 29, 2018

    Everywhere Americans look today, threats to their privacy are prevalent. Whether hackers are gaining access to our financial data or social media accounts, our location is being compromised by the GPS technology in our phones, or Internet of Things devices such as digital assistants and connected Barbie dolls passively listening to conversations in our homes, privacy is proving to be increasingly…

  • From the IoT to Insider Threats, 2018 Figures to Keep Security Leaders on Their Toes

    by Tony Kontzer on December 28, 2017

    As the world looks forward to saying goodbye to the crazy year that was 2017, security experts are chiming in about what to expect in 2018, and the news is not good: insider attacks, tax scams, election hacks, and holes created by the Internet of Things lead the list of threats that cyber security teams can expect to be most prominent in the coming year. Probably not the Christmas gift list they…

  • Shoring Up Online Retail Security Can Ensure A Merry E-Christmas For All

    by Tony Kontzer on December 20, 2017

    One thing we can all be sure of this holiday season: Lots of Americans are choosing to avoid the insanity in shopping malls by firing up their computers, phones and tablets to take care of their Christmas shopping online instead. Even though a steady flow of large-scale data breaches have hit American companies in recent months (hello, Equifax, Whole Foods and Uber, just to throw out a few…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs/by/177/kontzer on Thu, 19 Apr 2018 11:35:04 -0400.