Year in Review: Your Favorite Stories of 2015

cybersecurityThe end of the year is always a time for reflection, and as we start thinking about our New Year's Resolutions, it can be helpful to take a look at what we learned the year before--or at least in what we liked reading. Last year you were interested in a wide variety of topics including books on cybersecurity, methods of attack and learning more about the RSA Conference. 

What were your favorite stories in 2015? Here's the list: 

The Best Information Security Book of 2014 and Some Other Excellent Ones: Our book reviewer Ben Rothke took a look at the best books published in 2014, with a book about managing risk coming out on top. 

Get Ready for RSA Conference 2016 Call for Speakers: In 2015, you were interested in learning how to become a speaker at RSA Conference 2016. Our Senior Content Manager Britta Glade gave the lowdown on how to put together an application that was sure to get noticed. 

Is Defense In Depth Dead?: Today, a castle-like defense-in-depth architecture just doesn’t work anymore. It’s time for IT professionals to recognize that doubling down on that failed security philosophy is a waste of time and resources. What to do instead? 

Network Intrusion: Methods of Attack: Detecting an intrusion depends on the defenders having a clear understanding of how attacks work. 

HITRUST or High Risk? The Health Information Trust Alliance’s Common Security Framework: Author Gib Sorebo discusses why any cybersecurity framework, when used for compliance purposes, inevitably forces organizations into a checkbox mentality that discourages innovation, causes wasteful spending, and increases cybersecurity risk.

How We Foiled Ransomware and Got the Files Back: Derek Soeder, a senior threat researcher at Cylance, discussed how he and his team reverse engineered ransomware to recover the password used to encrypt client files.

Designing and Building a Security Operations Center: In "Designing and Building a Security Operations Center," author David Nathans provides the basics on how that can be done.

Welcome to the Securosis Guide to the RSA Conference: We let Securosis put together a little guide to the RSA Conference, and nobody got fired. 

Posted on December 30, 2015

Jennifer Lawinski

by Jennifer Lawinski

Editor-In-Chief, RSA Conference

← View more Blogs

This document was retrieved from on Mon, 24 Oct 2016 08:19:05 -0400.
© 2016 EMC Corporation. All rights reserved.