Menu

Blogs

  • Security and Privacy is Sometimes Suspect, but Growth of the Cloud Marches On

    by Robert Ackerman Jr. on January 12, 2017

    We increasingly hear that the most-discussed computing paradigm, cloud computing – especially the public cloud -- is resuming its sharp rate of growth after a lull and poised to accelerate further. This is refreshing news in a world ever-more obsessed with security, underscoring that cloud purveyors are making progress in getting security right. The attractions of cloud computing are obvious to…

  • Resources for the Community: USA Today’s Homeland Security Edition

    by RSAC Editorial Team on January 12, 2017

    December was a blur for many of us as we were closing out end of year activities, buying last minute presents, traveling to visit family and, of course, standing in line to see Rogue One: A Star Wars Story. And although I could spend many blogs discussing the events of Jedha City or Scarif, I’ll stay on topic and fill you in on what you may have missed during all the holiday hustle and bustle:…

  • Sign up for sessions ahead of time with NEW Reserve a Seat

    by Linda Gray Martin on January 12, 2017

    Wouldn’t it be great if you could arrive at RSA Conference already enrolled in the sessions of your choice? Instead of waiting in line for each session and wondering if a spot will be available, you could be using that time to engage in all of the other activities and events that the Conference has to offer. Our new Reserve a Seat feature allows you to do exactly that! Reserve a Seat lets you…

  • IT Security Concerns Loom Large for Financial Sector in 2017

    by Nathan Eddy on January 11, 2017

    Today’s financial sector chief information officer (CIO) is in the midst of a radical technological evolution, driven by global digitalization, adoption of mobile and cloud technologies by consumers, and the need for faster implementation of information technology. In addition, IT leadership is tasked with achieving higher revenue through technology, while continuing to adequately address…

  • Ransomware: Defending Against Digital Extortion

    by Ben Rothke on January 11, 2017

    As an early piece of malware, the 1989 Yankee Doodle virus was limited to playing the patriotic song of the same name. Much has changed over the years, and the rise of ransomware is playing out a very, and much less melodious tone. Countless individuals and businesses of all sizes are being locked out of their own data and their systems made unavailable, until a ransom is paid to the ransomware…

  • RSAC 2017 Ransomware Summit

    by Andrew Hay on January 9, 2017

    Nobody likes to think about their company’s critical data being compromised and held for ransom. Unfortunately, this type of threat, dubbed ransomware, cannot be ignored. In the first quarter of 2016 alone, CNN projected that cybercriminals collected more than $200 million through ransomware attacks. This would make ransomware a nearly $1 billion business annually, and it is growing quickly. This…

  • Getting to Know the RSAC Advisory Board: Todd Inskeep

    by RSAC Editorial Team on January 4, 2017

    Name: Todd Inskeep Title and company: Principal, Booz Allen Hamilton Number of years in the information security industry: 34 years RSAC: What was your first job in the infosec industry? Inskeep: Summer Intern at the Naval Research Labs working on Radio Voice Security RSAC: What does the RSA Conference 2017 theme, “The Power of Opportunity,” mean to you? Inskeep: For me, the Power of Opportunity…

  • Building an Internet of Things Risk Model in the Wake of Mirai

    by Gib Sorebo on December 30, 2016

    For many of us, Internet of Things (IoT) security has been nothing more than a cocktail party conversation. It sounds interesting but doesn’t necessarily affect our work or personal lives even if our job includes cybersecurity. While it is clearly a concern for operators of medical devices or industrial control systems, it seems less relevant for the typical enterprise or consumer. After all, …

  • Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

    by Ben Rothke on December 29, 2016

    Advanced persistent threats (APT) have gotten significant amounts of press over the last few years. When I first scanned the title of this book, I assumed it was on that topic. While Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies (Syngress 978-0128093160) does details APT, that’s not the main focus. The books…

  • Hollywood Cyber vs. Vegas Cyber

    by Wendy Nather on December 28, 2016

    You can go one of two ways with depicting cybersecurity in movies and TV shows: you can depict it so seriously that every technical mistake generates an outraged howl from the infosec pros, or you can romanticize it so that it becomes a cult classic. On the one side, you have the complaints about CSI:Cyber; on the other, you have every picture of Angelina Jolie on rollerblades. You have…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 16 Jan 2017 12:16:26 -0500.
© 2017 EMC Corporation. All rights reserved.