Menu

Blogs

Showing Blog Posts: 1–10 of 82 tagged Cloud Security

  • The Security Reading Room: The Best Information Security Books of 2016

    by Ben Rothke on February 5, 2017

    There were a lot of good information security books that came out in 2016, and many that were not worth reading. With that, here’s my list of the information security books stand out as the best, listed in no particular order: The Car Hacker's Handbook: A Guide for the Penetration Tester - plus ça change, plus c’est la même chose. Lots of features combined with poor security make cars the next big…

  • Security and Privacy is Sometimes Suspect, but Growth of the Cloud Marches On

    by Robert Ackerman Jr. on January 12, 2017

    We increasingly hear that the most-discussed computing paradigm, cloud computing – especially the public cloud -- is resuming its sharp rate of growth after a lull and poised to accelerate further. This is refreshing news in a world ever-more obsessed with security, underscoring that cloud purveyors are making progress in getting security right. The attractions of cloud computing are obvious to…

  • Maintaining Security When IT is on Holiday

    by Nathan Eddy on December 5, 2016

    With the holiday season fast approaching—they’re playing Jingle Bells in the department stores across the land—businesses need to be ready for the periods when IT security staff will be enjoying time with friends and family. The job of the IT pro isn’t likely to get easier anytime soon, and this is especially true during the holidays when employees are out of the office and expect to remain…

  • 10 Attributes of a NextGen Security Program

    by Rook Security on November 30, 2016

    By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to…

  • How to Protect Your Business When Your Cybersecurity Team Is Understaffed

    by Nathan Eddy on November 14, 2016

    There is a negative unemployment rate in IT security, which has led to a shortage of available talent in the market, with many firms unable to attract or evaluate key security talent. According to a Peninsula Press analysis of numbers from the Bureau of Labor Statistics, there were 209,000 unfilled cybersecurity jobs in the U.S. in 2015, with information security job postings up 74 percent in the…

  • Internet of Things: It’s Not Just the Devices!

    by Ed Skoudis on October 24, 2016

    With the holiday season around the corner, families are about to introduce a new raft of high-tech, Internet-connected gadgets into their homes worldwide. At the same time, enterprises are increasingly deploying automated building control systems and lighting technologies. Local governments are also getting in on the act as the move toward smart cities gathers steam. These advancements represent…

  • Infrastructure as Code: Managing Servers in the Cloud

    by Ben Rothke on August 19, 2016

    Many organizations have entered the world of cloud services, only to find it is not the panacea that they were lead to believe it would be. For example, while it’s relatively easy to spin up new servers in AWS (Amazon Web Services), managing those servers once they are operational is not such an easy endeavor. In Infrastructure as Code: Managing Servers in the Cloud (O'Reilly Media ISBN-10:…

  • Mobile Security Vulnerabilities Are Creating Big Problems

    by Sean Cunningham on August 2, 2016

    We hear constantly about devastating cyber attacks on government institutions, corporations and health care providers. Last summer, an attack against the U.S. Office of Personal Management exposed personal information about millions of federal employees. Successful cyber assaults against major American corporations such as Target, Sony and J.P. Morgan Chase also attracted attention. And barely more…

  • The Future of Cloud Security Starts with the Hypervisor

    by Liviu Arsene on June 28, 2016

    The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, and Gartner estimates it has reached its peak, having significantly matured. OS container-based virtualization and cloud computing have gained in popularity, with organizations' server virtualization rates reaching up to 75 percent. While hypervisor technologies have been split into Type 1 (native – or bare…

  • Big Data Is a Big Cybersecurity Problem for Banks

    by Caitlin Moriarity on June 1, 2016

    How many financial service companies are vulnerable to a data breach? Way too many, according to a new report. The report, put together by data security company Vormetric and issued in partnership with analyst firm 451 Research, shows that a whopping 90 percent of the IT security professionals surveyed in the financial services industry believe that their companies are vulnerable to a possible…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 21 Jul 2017 12:56:59 -0400.
© 2017 EMC Corporation. All rights reserved.