Menu

Blogs

  • Getting to Know the RSAC Advisory Board: Ed Skoudis

    by Jennifer Lawinski on December 2, 2016

    Leading image

    Name: Ed Skoudis Title and company: Instructor and Fellow, SANS Institute; Founder, Counter Hack Number of years in the information security industry: 20 RSAC: What was your first job in the infosec industry? Skoudis: Working at Bellcore helping the Baby Bells secure their early IP networks. RSAC: What does the RSA Conference 2017 theme, “The Power of Opportunity,” mean to you? Skoudis: Information security, when done well, can provide an organization with real power to get things done. Instead…

  • Secure Data Deletion

    by Ben Rothke on November 30, 2016

    The law of conservation of energy is that energy remains constant; it can be neither created or destroyed. It simply transforms from one form to another. While not a perfect analogy, data on a hard drive or other physical media is quite difficult to completely transform to the state of fully erased. While many have lost files and been unsuccessful in retrieving them, for an information security…

  • 10 Attributes of a NextGen Security Program

    by Rook Security on November 30, 2016

    By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to…

  • Businesses Must Secure Customer Data to Ensure Holiday Season Success

    by Nathan Eddy on November 28, 2016

    The holiday season is prime time for the use of credit card skimmers in retail environments. This time of year, the number of transactions increases and the ability of the average retailer to respond to threats is limited due to the amount of activity. Furthermore, most companies are in a change freeze between Thanksgiving and Christmas, slowing the rollout of new or modified security controls. …

  • StoryCorps @ RSAC: Follow the Path

    by Jennifer Lawinski on November 23, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. How does one wind up working in cybersecurity? Turns out, there are many paths one could take. This month's podcast features Dave Martin, Technology and Innovation Leader, IT Risk and…

  • DNS Security: Defending the Domain Name System

    by Ben Rothke on November 22, 2016

    That you are reading this review, and my ability to post it are due in large part due to the Domain Name System (DNS). DNS is Wikipedia describes it is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most…

  • Camouflaging State-Sponsored Malware Attacks

    by RSAC Contributor on November 21, 2016

    By Gunter Ollmann, CSO, Vectra Networks Most organizations continue to struggle with malware-based intrusions. Despite the deployment of policies, user education, enforcement chokepoints, data inspection, and regular assessment of defenses, malware remains the primary method of breaching the corporate network. While anti-virus vendors persist in publishing exposés on the latest and most advanced…

  • RSAC 2017 Speaker Submissions Parallel Industry Predictions and Real-World Events

    by Britta Glade on November 17, 2016

    This year has been the year of extortions and, more than ever before, conversations around cybersecurity are more mainstream with increased media coverage of everything from major enterprise hacks to dinner table discussions around the upcoming election and privacy. And with cyber-criminals collecting $209 million in just the first three months of 2016, we have seen an increase in overall consumer…

  • RSA Conference 2016 Abu Dhabi: Highlights From Day Two

    by Jennifer Lawinski on November 16, 2016

    RSA Conference 2016 Abu Dhabi was in full swing on Wednesday morning. The day kicked off with keynote addresses that touched on different facets of the cybersecurity industry. Sahir Hidayatullah, CEO of Smokescreen Technologies, began his keynote address with the tale of the U.S. Army’s ghost army, a unit that used deception tactics, a term we saw a lot of here at RSA Conference. The ghost army…

  • RSA Conference 2016 Abu Dhabi: Highlights From Day One

    by Jennifer Lawinski on November 15, 2016

    Day one here at RSA Conference 2016 Abu Dhabi has been quite a success! The halls of the Vendor Showcase were busy with attendees eager to learn about the latest and greatest cybersecurity developments, and ready to network. To kick off the event, Eng. Mohammed Al Zarooni, Acting/Deputy Director General, Information & eGov Sector of the Telecommunications Regulatory Authority welcomed attendees. He…

  • Ransomware, IoT, Blockchain (and More!): What You’ll See at RSA Conference 2017

    by Britta Glade on November 15, 2016

    With more than three months to go before we welcome you to San Francisco, RSA Conference 2017 is already breaking records. We had more submissions for regular session talks this year than ever before—almost 30 percent more! Let that sink in for a minute. We had almost 500 more submissions than our previous record high. And they weren’t submitted by zombie IoT devices or artificial intelligence…

This document was retrieved from https://www.rsaconference.com/blogs on Sun, 04 Dec 2016 07:12:39 -0500.
© 2016 EMC Corporation. All rights reserved.