Menu

Blogs

Showing Blog Posts: 1–10 of 61 tagged Encryption

  • Cybersecurity and Applied Mathematics

    by Ben Rothke on October 26, 2016

    Mathematics is an integral (no pun intended) part of information security and cryptography. The RSA cryptosystem is one of many examples—its foundation is based on mathematics. The core security of RSA is based on the practical difficulty of factoring the product of two very large prime numbers, known as the factoring problem. In elliptic curve cryptography (ECC), its security is based on the…

  • We Have Entered the New Cyber Reality, But Are We Ready?

    by Chenxi Wang on October 12, 2016

    During the U.S. presidential debate on September 26, the moderator asked the two candidates to address the following topic: Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it? The very fact that this topic has moved beyond IT whiteboards and corporate boardrooms and into the national Situation Room indicates that we…

  • The Rise of Nation-State Cyber Attacks Makes Encryption More Crucial Than Ever

    by Robert Ackerman Jr. on September 20, 2016

    No entity is immune from a cyber attack. A successful, jaw-dropping cyber assault against a seemingly impenetrable target occurred again last month. This time, the humbled target was the National Security Agency, the nation’s premier electronic eavesdropper. Three hundred megabytes of sophisticated code developed by the NSA to penetrate computer security systems was posted online for all to see. …

  • RSA Conference: Our Most Popular Posts from August 2016

    by Jennifer Lawinski on September 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of August this year? Top Blog Posts 1. Dissed by NIST:…

  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

    by Ben Rothke on September 6, 2016

    Bitcoin is a topic that evokes a sort of whodunit to many people. Created by an international man of mystery named Satoshi Nakamoto, it leads many to think this is a protocol that lends itself to a John Grisham novel. Many even think Bitcoin is a government conspiracy. But none of that could be further from the truth. As in introduction, Bitcoin is a digital currency and payment system created by…

  • Intelligence, Privacy Will Be Hot Topics at RSA Conference APJ 2016

    by Britta Glade on June 16, 2016

    RSA Conference Asia Pacific & Japan 2016 promises to be incredibly valuable for our attendees this year. More details on our stellar agenda continue to be added almost daily with care being taken to assure our delegates get maximum value for the investment they are making to attend. We are particularly pleased to welcome many top-rated—we refer them to rock stars at RSA Conference!—speakers to the…

  • SHA-1 Anyone? Let's Hash It Out...

    by RSAC Contributor on May 26, 2016

    By Errol Lloyd, Principal / Technical Lead, Data Protection Engineering, Fidelity Technology Group The Peer2Peer discussion in SHA-1 Anyone? Let's Hash It Out... centered on the web's transition away from the SHA-1 hashing algorithm, used as a digital signature within digital certificates. To kick-off the session, I asked if anyone heard the SHA-1 news during the Cryptographers' Panel earlier that…

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s…

  • World Password Day 2016: How Do You Manage Your Passwords?

    by Jennifer Lawinski on May 5, 2016

    I recently signed up for the TSA Global Entry Pre-Check program, because as I'm going to be traveling for RSA Conference, I'll be spending quality time at JFK for more than just vacations. Why is this information I'm sharing with you on World Password Day 2016? Just two days after I created my account on the government's site, I was notified via email that there was a change in my application…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

This document was retrieved from https://www.rsaconference.com/blogs on Sun, 04 Dec 2016 01:07:41 -0500.
© 2016 EMC Corporation. All rights reserved.