• Q&A Series with RSAC Ambassador James Lyne

    by RSAC Editorial Team on March 21, 2018

    Leading image

    In part three of this series, meet RSAC Ambassador, James Lyne! James is Global Research Advisor at Sophos, and a frequent speaker at RSA Conference. We reached out to James to ask him a few questions as a repeat speaker and attendee, so read on for his thoughts on where to network and how he is prepping for his session and keynote. How many times have you attended RSAC? I have attended RSAC 7 times now and am looking forward to my next visit. What is the #1 reason you attend RSAC? I always run…

  • Five Security Problems You Don’t Know You Should Be Worried About (and What You Can Do About Them)

    by David J. Blumberg on March 20, 2018

    RSA Conference 2018 USA is approaching and at Blumberg Capital we’ve started discussing what we’re most excited to see. The show floor and breakout sessions are great places to investigate current and upcoming threats and find solutions for them. Of course, many people are interested in the typical security challenges, and while solving them is a requirement for conducting business today, the…

  • Ben's Book of the Month: Review of "The EU General Data Protection Regulation (GDPR): A Practical Guide"

    by Ben Rothke on March 16, 2018

    It was about 20 years ago that the Y2K problem had firms scrambling to fix the issue. At its core, it was a rather simple problem to fix. Firms just had to change a 2-digit year field to a 4-digit field. But the devil, as always, was in the details and firms struggled to understand how many applications they had, and where the date fields resided in their massive code base. Many Fortune 500 firms…

  • NIST Cybersecurity Framework Getting a Facelift, Looking to Make Adoption Easier

    by Tony Kontzer on March 15, 2018

    One of the biggest obstacles to securing the nation's critical infrastructure components, as well as to securing enterprise environments, is poor coordination. Whether it's the lack of a common vocabulary, a lack of agreement about best practices and recommended methodologies, or simply seeing security through different lenses, it's clear that without a common playbook from which to collaborate, …

  • Q&A Series with RSAC Ambassador Chester Wisniewski

    by RSAC Editorial Team on March 14, 2018

    In part two of this four-part series, meet RSAC Ambassador, Chester Wisniewski! Chester is Principal Research Scientist at Sophos, and a recent speaker at RSA Conference. We reached out to Chester to ask him a few questions as a past RSAC attendee, so read on for his thoughts on why to attend RSAC, where to eat, and which programs are must-attends: How many times have you attended RSAC? I can't…

  • Q&A Series with RSAC Ambassador Mark Nunnikhoven

    by RSAC Editorial Team on March 9, 2018

    As an information security professional, your work is never truly done. A new threat here. An advancing challenge there. All the more reason why you need to stay one step ahead of the cyber-curve. RSA Conference 2018 is here to help you do just that. As the world’s leading cybersecurity event, we bring together professionals from all sides of the field—CISOs to security engineers—to give you the…

  • If You Haven’t Filed Your Taxes, You May Want to Get Them Filed Today

    by RSAC Editorial Team on March 9, 2018

    In 2016, the IRS paid out nearly $239 million in “suspect tax refunds” and while the organization announced a steep decline in tax-related identity theft last year, fraud is an ongoing issue this time of year. In light of recent data breaches that made U.S. residents’ personal information more vulnerable than usual, it is likely that the number of fraudulent tax returns will increase in 2018. So, …

  • Using Machine Learning and DNS in the Cat & Mouse Game of Fighting Bot Malware

    by Yuriy Iuzifovich on March 8, 2018

    Although they’ve been on the security radar for years, Botnets have not gone away. Bots lurking on devices are trained to find valuable data like credit cards, logins, or credentials for financial transactions, and quietly exfiltrate them for monetization. Bot malware spreads randomly using software flaws or social engineering and attackers always want to maximize their ROI. Contemporary botnets…

  • The Lovable Defector and the Double-Edged Sword of Technology

    by RSAC Editorial Team on March 7, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is part three of a five-part monthly series to kick off 2018 in which we take a look at characters from the Star Wars saga and how technology, topics, and trends from the cybersecurity world compare to characters and themes from the blockbuster films. We hope you enjoy our blog series in which the Resistance, filled with…

  • Addressing Diversity at RSA Conference and in the Cybersecurity Industry

    by Sandra Toms on March 5, 2018

    We’ve been listening closely to the recent discussions surrounding the lack of female keynote speakers at RSA Conference, and we want to address it head on. We hear you. We understand. The Conference leadership team is made up of women, like myself, and we’re very much aware of the importance and value of bringing more women’s voices, perspectives and experiences to the forefront of conversations…

  • How Educational Institutions Are Failing to Adequately Protect Student Data

    by Tony Kontzer on February 28, 2018

    With security at the forefront of hot button issues across the country right now, one threat often gone unnoticed to students' well-being is the growing frequency with which their personal data is being compromised. Cyber criminals' increased interest in attacking education systems imperils students' financial futures and privacy, and gives parents a reason to question whether schools are up to…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from on Wed, 21 Mar 2018 18:27:37 -0400.