Menu

Blogs

Showing Blog Posts: 1–10 of 75 tagged IT

  • Delivering on Digital: The Innovators and Technologies That Are Transforming Government

    by Ben Rothke on July 17, 2016

    The debacle of the Healthcare.gov launch in 2013 was one the biggest public IT failures in history. There have been hundreds of articles written on the myriad reasons for the failure. In Delivering on Digital: The Innovators and Technologies That Are Transforming Government (RosettaBooks 0795347510), author William Eggers showcases the other side of the story, the many cases where government IT…

  • The Importance of Developing Cybersecurity Resilience in the Middle East

    by Stephen Brennan on July 8, 2016

    The Middle East features a complex mix of developed and developing economies, with varying levels of infrastructure deployment, and ICT connectivity. Compounding these variances are the geo-political overtures present in the region, which create a patchwork of allies and adversaries in a concentration that is probably not found anywhere else on the planet. Security experts understand that…

  • RSA Conference Greatest Hits: June 2016

    by Jennifer Lawinski on July 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of June this year? Top Blog Posts 1. The Dangers of…

  • Succeeding in Security

    by Ryan Berg on July 6, 2016

    If you are in the midst of a career change, you might want to consider entering the cybersecurity market, expected to grow from $75 billion in 2015 to $170 billion by 2020. More than 209,000 cybersecurity jobs in the U.S. are unfilled, and as worldwide cyber threats become more sophisticated and prevalent, organizations are depending on security professionals for their success. Of course, this…

  • The Future of Cloud Security Starts with the Hypervisor

    by Liviu Arsene on June 28, 2016

    The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, and Gartner estimates it has reached its peak, having significantly matured. OS container-based virtualization and cloud computing have gained in popularity, with organizations' server virtualization rates reaching up to 75 percent. While hypervisor technologies have been split into Type 1 (native – or bare…

  • Banks Need to Rethink Cybersecurity After Recent Heists Through SWIFT

    by Caitlin Moriarity on June 17, 2016

    Cyberheists are on the rise. But how are hackers getting into financial institutions with some of the best security on the planet? Through a third party, it turns out. A number of major international cyberheists have been connected to the interbank SWIFT messaging system. Tien Phong Commercial Joint Stock Bank, based in Hanoi, Vietnam, said in a May 15 statement that it had recently foiled an…

  • How Not to Network a Nation: The Uneasy History of the Soviet Internet

    by Ben Rothke on June 15, 2016

    There are often questions or ideas that when you first hear them, you ask yourself: why didn’t I think of that? In How Not to Network a Nation: The Uneasy History of the Soviet Internet (MIT Press 978-0262034180), author Benjamin Peters (Professor, Department of Communication at the University of Tulsa) asks the simple question: why didn’t the Soviet Union create something akin to the Internet…

  • Plan, Pray, or Pay: What to Do After a Ransomware Attack

    by Ryan Berg on June 14, 2016

    If you’re not planning, then you’re praying. And praying doesn’t lower your odds of having to pay when ransomware hits. In the immediate aftermath of a ransomware attack—once you get past the initial confusion and shock—you’re likely to find the limited options available to you were determined by choices you made (or didn’t make) weeks and months ago. Yes, there are things you can do to try to…

  • RSA Conference Greatest Hits: May 2016

    by Jennifer Lawinski on June 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of May this year? Top Blog Posts 1. Executive Hotel…

  • Small Business: Wake Up to Growing Cyber Threats

    by Robert Ackerman Jr. on June 3, 2016

    A few months ago, Rokenbok Education, a Solana Beach, Calif., maker of educational toys, was facing perhaps the quintessential nightmare of the 21 st century. Cyber criminals had encrypted the company’s computer files, rendering them useless. The hackers were deploying ransomware. If Rokenbok wanted the data unlocked, it would have to pay a ransom. As the New York Times reported, the company…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Tue, 26 Jul 2016 06:14:04 -0400.
© 2016 EMC Corporation. All rights reserved.