• RSAC 2016 Abu Dhabi: Sessions Not to Miss

    by Jennifer Lawinski on October 26, 2016

    Leading image

    RSA Conference 2016 Abu Dhabi is just a few weeks away, and we here at RSA Conference couldn’t be more excited. Our event in Abu Dhabi brings some of the sharpest cybersecurity minds from around the globe to the Middle East, and this year is no exception. We have more than 40 sessions across seven tracks, and that’s not to mention our Learning Lab and Security Foundations Seminar. However, with so much on offer, it can be tricky to choose which are right for you. To help make your time in Abu…

  • Cybersecurity and Applied Mathematics

    by Ben Rothke on October 26, 2016

    Mathematics is an integral (no pun intended) part of information security and cryptography. The RSA cryptosystem is one of many examples—its foundation is based on mathematics. The core security of RSA is based on the practical difficulty of factoring the product of two very large prime numbers, known as the factoring problem. In elliptic curve cryptography (ECC), its security is based on the…

  • Internet of Things: It’s Not Just the Devices!

    by Ed Skoudis on October 24, 2016

    With the holiday season around the corner, families are about to introduce a new raft of high-tech, Internet-connected gadgets into their homes worldwide. At the same time, enterprises are increasingly deploying automated building control systems and lighting technologies. Local governments are also getting in on the act as the move toward smart cities gathers steam. These advancements represent…

  • Getting to Know the RSAC Advisory Board: Wade Baker

    by Jennifer Lawinski on October 21, 2016

    Name: Wade Baker Title and company: Independent consultant and Co-Founder of the Cyentia Institute Number of years in the information security industry: About 15 years RSAC: What was your first job in the infosec industry? Baker: I was an instructor and system/network administrator at a university. They needed someone to take on infosec teaching and administrative responsibilities, and offered to…

  • StoryCorps @ RSAC: You Need to Shine Your Light

    by Jennifer Lawinski on October 20, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. How can we make sure our kids stay healthy and resiliant in our digital world? The biggest impact you can have as a parent and cyber-professional is working with kids to teach them about…

  • The Customer Threat

    by Wendy Nather on October 17, 2016

    For Cyber Security Awareness Month, we’re taking a closer look at cybercrime, and what organizations can do about it. To address cybercrime, you need both prevention and detection. That’s an obvious-sounding platitude, and it’s not as helpful as it could be, despite it being true. The biggest problem when it comes to detection is that skilled attackers will look exactly like authorized users. …

  • Getting to Know the RSAC Advisory Board: Wendy Nather

    by Jennifer Lawinski on October 14, 2016

    Name: Wendy Nather Title and company: Research Director, Retail Cyber Intelligence Sharing Center Number of years in the information security industry: 20 RSAC: What was your first job in the infosec industry? Nather: Director of IT Security for the EMEA region of the investment banking division of Swiss Bank Corporation RSAC: What does the RSA Conference 2017 theme, "The Power of Opportunity,"…

  • Information Security Policies, Procedures, and Standards: A Practitioner's Reference

    by Ben Rothke on October 13, 2016

    Security policies are like fiber (the kind you eat, not the telco type). Everyone agrees they are important, but often don’t want to deal with it. Most organizations eventually realize there comes a time that they are forced to tame the beast known as information security policies. They are often forced into this when it they get requests for a 3rd-party audit, PCI DSS compliance, visit from the…

  • We Have Entered the New Cyber Reality, But Are We Ready?

    by Chenxi Wang on October 12, 2016

    During the U.S. presidential debate on September 26, the moderator asked the two candidates to address the following topic: Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it? The very fact that this topic has moved beyond IT whiteboards and corporate boardrooms and into the national Situation Room indicates that we…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

This document was retrieved from on Thu, 27 Oct 2016 00:59:33 -0400.
© 2016 EMC Corporation. All rights reserved.