Menu

Blogs

Showing Blog Posts: 1–10 of 69 tagged Cryptography

  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

    by Ben Rothke on September 6, 2016

    Bitcoin is a topic that evokes a sort of whodunit to many people. Created by an international man of mystery named Satoshi Nakamoto, it leads many to think this is a protocol that lends itself to a John Grisham novel. Many even think Bitcoin is a government conspiracy. But none of that could be further from the truth. As in introduction, Bitcoin is a digital currency and payment system created by…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • The Mathematics of Various Entertaining Subjects: Research in Recreational Math

    by Ben Rothke on March 10, 2016

    Recreational mathematics as defined by Wikipedia is a term for mathematics carried out for recreation (entertainment) rather than as a strictly research and application-based professional activity, although it is not necessarily limited to being an endeavor for amateurs. It often involves mathematical puzzles and games. Perhaps the greatest proponent of recreational mathematics was Martin…

  • Encryption Made Simple for Lawyers

    by Ben Rothke on January 6, 2016

    The good thing about encryption is that it can make your data virtually impossible to be read by anyone except those you allow. The bad thing about encryption is that it’s relatively easy to do wrong. And in many cases, people have made configuration errors such that they have locked themselves out of their own data. In Encryption Made Simple for Lawyers (American Bar Association - 978-16342505…

  • Reflections on RSA Conference 2015 Abu Dhabi

    by RSAC Contributor on December 3, 2015

    RSA Conference goes to the Middle East for the first time with RSA Conference 2015 Abu Dhabi. Rashed Al Oraimi, lead technologist at Booz Allen Hamilton, provided the following report. It was the last working day of the week in Abu Dhabi, and most of us were planning our weekends with family, yet the floors at Emirate Palace hotel were jam-packed with computer security professionals and companies…

  • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

    by Ben Rothke on August 19, 2015

    It’s not clear who first uttered the quip: Of course I can keep a secret. It's the people I tell it to that can't. But what’s clear is that there are plenty of times when it’s a matter of life and death to ensure that secrets remain undisclosed. In The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, author Simon Singh reveals the often hush-hush world of the science of…

  • How We Foiled Ransomware and Got the Files Back

    by RSAC Contributor on June 5, 2015

    Derek Soeder is a senior threat researcher at Cylance. In this post, Soeder discusses how he and his team reverse engineered ransomware to recover the password used to encrypt client files. In the interest of length, some of the technical steps the team took have been omitted from this story, but the original is now available on the Cylance website. Read on to find out just what Soeder had to do to…

  • News Pick: TUAW Explains Apple Pay

    by Fahmida Y. Rashid on October 8, 2014

    If you are at all interested in Apple Pay and how it works, make sure to check out the thorough writeup examining the security behind the technology by Yoni Heisler over at The Unofficial Apple Weblog. Heisler spoke with a few individuals involved with the development of Apple Pay to understand how the mobile payment technology works and to determine whether it's secure. One takeaway from the…

This document was retrieved from https://www.rsaconference.com/blogs on Thu, 29 Sep 2016 21:31:55 -0400.
© 2016 EMC Corporation. All rights reserved.