Menu

Blogs

Showing Blog Posts: 1–10 of 399 tagged Cybersecurity

  • What the Super Bowl Teaches About Cyber Security – Are Security and Operations Uniting Like a Team?

    by Allison Cramer on February 5, 2017

    I survived the play offs, wondered why anyone watches the Pro Bowl, and then set my focus on the Super Bowl. Who would win – who had the best skills, best coaching, best records, etc. As I wondered I started to see similarities between the relationships of the players and the relationships of security and operations teams. Stick with me for a moment. At the simplest level, the defense is there to…

  • Financial Cybersecurity Regulations Are a Win for Privacy

    by Tom Boyden on January 30, 2017

    Beginning this year, financial and insurance companies in the state of New York will have to comply with some of the country’s most stringent and far-reaching cybersecurity regulations. In September, Governor Andrew Cuomo announced the new rules, which are meant to protect consumers, companies, and our financial infrastructure from the growing threat of cyberattacks. The regulations in their…

  • Planning for RSA Conference? How to optimize your experience

    by Kenneth Morrison on January 29, 2017

    Attending the RSA Conference (RSAC) for the first time can be a somewhat daunting experience. As anyone who has attended a past event will confirm, there is a veritable wealth of opportunity packed into a few days in the heart of one of the world’s most exciting cities! So how do you optimize your time to maximize your benefit? First, RSAC is designed to cover the interests of many different IT…

  • Getting Users Committed to Security: Simple tips to increase user interest and commitment around common threats to their system

    by Jack Danahy on January 26, 2017

    Users are vulnerable to clever malware campaigns and social engineering, making them a common first link in the attack chain. Even in major breaches and ransomware attacks affecting multiple systems or sizable organizations, the entry point is usually created by a single mistake made by some unwitting user. These mistakes are also a meaningful distraction for IT teams, as more than 50% of the…

  • Banking Apps Look to Balance Convenience, Security

    by Nathan Eddy on January 25, 2017

    Mobile banking technology is poised to become ubiquitous. Soon connecting with your banker via video will be as easy and commonplace as checking your account balance on your smartphone. In the not-so-distant future, customers will expect to always have the option to chat face-to-face with their banker either on a mobile app, from an ATM or at a kiosk or meeting room in the branch itself. With…

  • Strengthen Your Cybersecurity Readiness in 2017

    by Abby Johnson on January 18, 2017

    Once again, 2016 was a noteworthy year for cybersecurity. With major data breaches affecting millions of customers and companies from the IRS, LinkedIn, Dropbox, Yahoo! and beyond. According to ESG and the Information Systems Security Association (ISSA) Research report, organizations increased cybersecurity funding in 39% of cases, and professionals implemented new access controls at the same…

  • History is Repeating Itself (In a Good Way)

    by Feris Rifai on January 17, 2017

    History is repeating itself. Before Sarbanes Oxley passed in 2002, having a director that was a financial expert in the American corporate boardroom was not the norm. In fact, CFOs who were originally thought of as financial gatekeepers are more than ever before held accountable for the integrity, accuracy and traceability of the financial information presented to the board. Today, we all know…

  • Resources for the Community: USA Today’s Homeland Security Edition

    by RSAC Editorial Team on January 12, 2017

    December was a blur for many of us as we were closing out end of year activities, buying last minute presents, traveling to visit family and, of course, standing in line to see Rogue One: A Star Wars Story. And although I could spend many blogs discussing the events of Jedha City or Scarif, I’ll stay on topic and fill you in on what you may have missed during all the holiday hustle and bustle:…

  • IT Security Concerns Loom Large for Financial Sector in 2017

    by Nathan Eddy on January 11, 2017

    Today’s financial sector chief information officer (CIO) is in the midst of a radical technological evolution, driven by global digitalization, adoption of mobile and cloud technologies by consumers, and the need for faster implementation of information technology. In addition, IT leadership is tasked with achieving higher revenue through technology, while continuing to adequately address…

  • Getting to Know the RSAC Advisory Board: Todd Inskeep

    by RSAC Editorial Team on January 4, 2017

    Name: Todd Inskeep Title and company: Principal, Booz Allen Hamilton Number of years in the information security industry: 34 years RSAC: What was your first job in the infosec industry? Inskeep: Summer Intern at the Naval Research Labs working on Radio Voice Security RSAC: What does the RSA Conference 2017 theme, “The Power of Opportunity,” mean to you? Inskeep: For me, the Power of Opportunity…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 23 Feb 2017 06:48:36 -0500.
© 2017 EMC Corporation. All rights reserved.