Menu

Blogs

Showing Blog Posts: 1–10 of 59 tagged Encryption

  • The Rise of Nation-State Cyber Attacks Makes Encryption More Crucial Than Ever

    by Robert Ackerman Jr. on September 20, 2016

    No entity is immune from a cyber attack. A successful, jaw-dropping cyber assault against a seemingly impenetrable target occurred again last month. This time, the humbled target was the National Security Agency, the nation’s premier electronic eavesdropper. Three hundred megabytes of sophisticated code developed by the NSA to penetrate computer security systems was posted online for all to see. …

  • RSA Conference: Our Most Popular Posts from August 2016

    by Jennifer Lawinski on September 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of August this year? Top Blog Posts 1. Dissed by NIST:…

  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

    by Ben Rothke on September 6, 2016

    Bitcoin is a topic that evokes a sort of whodunit to many people. Created by an international man of mystery named Satoshi Nakamoto, it leads many to think this is a protocol that lends itself to a John Grisham novel. Many even think Bitcoin is a government conspiracy. But none of that could be further from the truth. As in introduction, Bitcoin is a digital currency and payment system created by…

  • Intelligence, Privacy Will Be Hot Topics at RSA Conference APJ 2016

    by Britta Glade on June 16, 2016

    RSA Conference Asia Pacific & Japan 2016 promises to be incredibly valuable for our attendees this year. More details on our stellar agenda continue to be added almost daily with care being taken to assure our delegates get maximum value for the investment they are making to attend. We are particularly pleased to welcome many top-rated—we refer them to rock stars at RSA Conference!—speakers to the…

  • SHA-1 Anyone? Let's Hash It Out...

    by RSAC Contributor on May 26, 2016

    By Errol Lloyd, Principal / Technical Lead, Data Protection Engineering, Fidelity Technology Group The Peer2Peer discussion in SHA-1 Anyone? Let's Hash It Out... centered on the web's transition away from the SHA-1 hashing algorithm, used as a digital signature within digital certificates. To kick-off the session, I asked if anyone heard the SHA-1 news during the Cryptographers' Panel earlier that…

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s…

  • World Password Day 2016: How Do You Manage Your Passwords?

    by Jennifer Lawinski on May 5, 2016

    I recently signed up for the TSA Global Entry Pre-Check program, because as I'm going to be traveling for RSA Conference, I'll be spending quality time at JFK for more than just vacations. Why is this information I'm sharing with you on World Password Day 2016? Just two days after I created my account on the government's site, I was notified via email that there was a change in my application…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • Protecting Cloud Applications: A SaaS Point of View

    by RSAC Contributor on March 31, 2016

    By Venkat Rangan, CTO at Clari A lot has been written about cloud applications and what an organization needs to do to protect their information assets when moving their applications to the cloud. The Cloud Security Alliance in their The Notorious Nine Cloud Computing Threats summarizes the threats to an organization when they sign up for a SaaS application or engage with a SaaS provider, but very…

  • Weekend Reading: Verizon Breached, Cloud Threats and More

    by Jennifer Lawinski on March 25, 2016

    We know your work days are so busy that many of the week's best cybersecurity stories often get lost in the shuffle. That's where Weekend Reading comes in. Each Friday, we'll bring you the best news and analysis from the cybersecurity world to help you stay on top of industry issues. This week's big cybersecurity news comes from security journalist Brian Krebs, who broke the news this week that …

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Sat, 24 Sep 2016 21:59:49 -0400.
© 2016 EMC Corporation. All rights reserved.