Showing Blog Posts: 1–10 of 40 tagged Human Element

  • Information Security Policies, Procedures, and Standards: A Practitioner's Reference

    by Ben Rothke on October 13, 2016

    Security policies are like fiber (the kind you eat, not the telco type). Everyone agrees they are important, but often don’t want to deal with it. Most organizations eventually realize there comes a time that they are forced to tame the beast known as information security policies. They are often forced into this when it they get requests for a 3rd-party audit, PCI DSS compliance, visit from the…

  • RSA Conference: Our Most Popular Posts from September 2016

    by Jennifer Lawinski on October 5, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of September this year? Top Blog Posts 1. Why Study C…

  • Embracing the Power of Opportunity During Cyber Security Awareness Month: Stop. Think. Connect.

    by Sandra Toms on October 3, 2016

    October marks National Cyber Security Awareness Month: a great opportunity for all of us to take a moment to think about how we are protecting ourselves in this increasingly connected world. This reminder applies to everyone: from the CISO, to the college student interested in exploring a career in the security industry, to the mom curious how to bridge a conversation with her children about…

  • National Cyber Security Awareness Month: Staying Safe Online

    by Jennifer Lawinski on September 30, 2016

    This October, as we kick off National Cyber Security Awareness Month, cybersecurity is at the forefront of the national conversation, and staying safe online is more challenging and more important than ever before. With news breaking regularly on hacks that affect millions of people, like the recent revelation that 500 million user accounts at Yahoo! had been breached, it can be confusing to know…

  • Top Things Even Security Experts Forget

    by Todd Inskeep on September 28, 2016

    National Cyber Security Awareness Month in October marks a good time for all organizations to think about how they can build and reinforce a workplace culture of security and privacy. This security culture has to be created, fed and reinforced through an investment in activities and engaging training materials throughout the year—not only during the annual security training meetings. As…

  • The New Security Boundaries and How to Protect Them

    by Peter Merkulov on September 23, 2016

    The traditional network perimeter is a relic—a vestige of a time before the advent of easy mobility. And security strategies that focus on traditional perimeter defense are a symptom of change resistance and of a fixation on the past rather than a vision for the future. Consider this; the latest Ericsson mobility report says that 90 percent of the world’s population over the age of six will own a…

  • Getting Everyone on Board with Cybersecurity

    by Steve Sheck on September 16, 2016

    It’s shocking to those of us who work in the industry, but people still do not take cybersecurity seriously. How many people do you work with who still use “abc1234!” as a password? Or say things like “I haven’t updated my phone’s OS in months?” Many think of cybersecurity like a home defense system. You push a button, and the house (your organization) is secure. That’s not the case. Imagine if, …

  • Cybersecurity Conventions: A Newcomer's Perspective

    by Dale "Woody" Wooden on August 31, 2016

    First, let me start by saying yes, I will be doing a follow-up to RFID blocking wallets. I’m still testing this material and only had one manufacturer who sent me equipment for the Pepsi Challenge. (You can send inquiries to But let me talk now about cybersecurtiy conferences. This year was my first attending one cybersecurity event and my second at another. I’m…

  • Cybersecurity: The Quick and the Dead

    by Robert Statica on August 15, 2016

    More than two million people were affected by cyber crime in the UAE last year and not a week goes by without a report of a business having its files hacked or leaked. The UAE, as a global business hub and point of exchange, is particularly vulnerable to attackers from across the world. CEOs and their colleagues in IT and cybersecurity simply can’t afford to wait until they become a victim of an…

  • Summer Slacking: 8 Security Mistakes Your Users Are Making

    by Ryan Berg on August 9, 2016

    As an IT professional, you’re expected to be always on. But for your users, it’s summertime, and that means BBQ’s and beer (although in Texas that’s pretty much year round.) With cookouts to host and vacations to plan, following your company’s security policies to the letter isn’t going to be the first thing on your users’ minds. Here are seven mistakes your users are prone to making during the…

This document was retrieved from on Tue, 25 Oct 2016 02:41:21 -0400.
© 2016 EMC Corporation. All rights reserved.