Menu

Blogs

Showing Blog Posts: 1–10 of 72 tagged Cryptography

  • A few new names you’ll see gracing our stage in 2017

    by RSAC Editorial Team on January 16, 2017

    This past week RSA Conference was proud to roll out its 2017 line up of marquis keynote speakers. The editorial team was able to catch up with Linda Gray Martin, director & general manager, RSA Conference to answer some of our questions about the keynote process. RSAC: That is a very robust list of speakers. For any new attendees that may be wondering, how are keynotes determined? Gray Martin:…

  • Cybersecurity and Applied Mathematics

    by Ben Rothke on October 26, 2016

    Mathematics is an integral (no pun intended) part of information security and cryptography. The RSA cryptosystem is one of many examples—its foundation is based on mathematics. The core security of RSA is based on the practical difficulty of factoring the product of two very large prime numbers, known as the factoring problem. In elliptic curve cryptography (ECC), its security is based on the…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

    by Ben Rothke on September 6, 2016

    Bitcoin is a topic that evokes a sort of whodunit to many people. Created by an international man of mystery named Satoshi Nakamoto, it leads many to think this is a protocol that lends itself to a John Grisham novel. Many even think Bitcoin is a government conspiracy. But none of that could be further from the truth. As in introduction, Bitcoin is a digital currency and payment system created by…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • The Mathematics of Various Entertaining Subjects: Research in Recreational Math

    by Ben Rothke on March 10, 2016

    Recreational mathematics as defined by Wikipedia is a term for mathematics carried out for recreation (entertainment) rather than as a strictly research and application-based professional activity, although it is not necessarily limited to being an endeavor for amateurs. It often involves mathematical puzzles and games. Perhaps the greatest proponent of recreational mathematics was Martin…

  • Encryption Made Simple for Lawyers

    by Ben Rothke on January 6, 2016

    The good thing about encryption is that it can make your data virtually impossible to be read by anyone except those you allow. The bad thing about encryption is that it’s relatively easy to do wrong. And in many cases, people have made configuration errors such that they have locked themselves out of their own data. In Encryption Made Simple for Lawyers (American Bar Association - 978-16342505…

  • Reflections on RSA Conference 2015 Abu Dhabi

    by RSAC Contributor on December 3, 2015

    RSA Conference goes to the Middle East for the first time with RSA Conference 2015 Abu Dhabi. Rashed Al Oraimi, lead technologist at Booz Allen Hamilton, provided the following report. It was the last working day of the week in Abu Dhabi, and most of us were planning our weekends with family, yet the floors at Emirate Palace hotel were jam-packed with computer security professionals and companies…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 21 Jan 2017 16:42:55 -0500.
© 2017 EMC Corporation. All rights reserved.