Showing Blog Posts: 1–10 of 81 tagged IT

  • The Longevity Challenge in Infosec

    by Wendy Nather on October 4, 2016

    In a recent BankInfoSecurity article, U.S. Federal Chief Information Officer Tony Scott was quoted as saying one of the main factors behind the OPM breach was the tendency of Congress to “fund civilian agencies to maintain their information systems, not to modernize them.” This is endemic both in the public sector and in other organizations below the security poverty line, which I started writing…

  • Getting Everyone on Board with Cybersecurity

    by Steve Sheck on September 16, 2016

    It’s shocking to those of us who work in the industry, but people still do not take cybersecurity seriously. How many people do you work with who still use “abc1234!” as a password? Or say things like “I haven’t updated my phone’s OS in months?” Many think of cybersecurity like a home defense system. You push a button, and the house (your organization) is secure. That’s not the case. Imagine if, …

  • It Takes a Village to Manage Cyber Risk

    by Ryan Stolte on September 9, 2016

    When it comes to defending against today’s most sophisticated criminals, it truly takes a village. And I don’t mean solely ensuring employees use strong passwords and avoid clicking on suspicious links. Security teams, line-of-business application owners and boards of directors all must proactively make security their business. Each stakeholder plays a role in ensuring the most severe threats are…

  • A Few Thoughts on Automating Security to Improve Effectiveness

    by RSAC Contributor on August 29, 2016

    By Bret Hartman, Vice President and CTO, Cisco Security Business Group During RSA 2016, I led a Peer2Peer discussion titled Is Automation the Answer for Security in the Digital World? My goal for this session was to gain insight regarding different ways the automation of security operations might improve defenses—as well as the benefits, risks and limitations of those approaches. A number of…

  • Summer Slacking: 8 Security Mistakes Your Users Are Making

    by Ryan Berg on August 9, 2016

    As an IT professional, you’re expected to be always on. But for your users, it’s summertime, and that means BBQ’s and beer (although in Texas that’s pretty much year round.) With cookouts to host and vacations to plan, following your company’s security policies to the letter isn’t going to be the first thing on your users’ minds. Here are seven mistakes your users are prone to making during the…

  • Good Security Belongs in the Background

    by Rook Security on August 4, 2016

    By Mike Patterson You may have read that Jason Bourne took the #1 spot at the domestic box office last weekend, with $60 million in ticket sales—one of the better debuts of the summer. That translates into approximately 6 million people seeing the movie, and probably less than a dozen noticed the minor role Rook Security and I played in the fictitious Exocon show at the Aria in the second half of…

  • Delivering on Digital: The Innovators and Technologies That Are Transforming Government

    by Ben Rothke on July 17, 2016

    The debacle of the launch in 2013 was one the biggest public IT failures in history. There have been hundreds of articles written on the myriad reasons for the failure. In Delivering on Digital: The Innovators and Technologies That Are Transforming Government (RosettaBooks 0795347510), author William Eggers showcases the other side of the story, the many cases where government IT…

  • The Importance of Developing Cybersecurity Resilience in the Middle East

    by Stephen Brennan on July 8, 2016

    The Middle East features a complex mix of developed and developing economies, with varying levels of infrastructure deployment, and ICT connectivity. Compounding these variances are the geo-political overtures present in the region, which create a patchwork of allies and adversaries in a concentration that is probably not found anywhere else on the planet. Security experts understand that…

  • RSA Conference Greatest Hits: June 2016

    by Jennifer Lawinski on July 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of June this year? Top Blog Posts 1. The Dangers of…

  • Succeeding in Security

    by Ryan Berg on July 6, 2016

    If you are in the midst of a career change, you might want to consider entering the cybersecurity market, expected to grow from $75 billion in 2015 to $170 billion by 2020. More than 209,000 cybersecurity jobs in the U.S. are unfilled, and as worldwide cyber threats become more sophisticated and prevalent, organizations are depending on security professionals for their success. Of course, this…

This document was retrieved from on Sat, 22 Oct 2016 19:30:05 -0400.
© 2016 EMC Corporation. All rights reserved.