Menu

Blogs

Showing Blog Posts: 1–10 of 80 tagged IT

  • Getting Everyone on Board with Cybersecurity

    by Steve Sheck on September 16, 2016

    It’s shocking to those of us who work in the industry, but people still do not take cybersecurity seriously. How many people do you work with who still use “abc1234!” as a password? Or say things like “I haven’t updated my phone’s OS in months?” Many think of cybersecurity like a home defense system. You push a button, and the house (your organization) is secure. That’s not the case. Imagine if, …

  • It Takes a Village to Manage Cyber Risk

    by Ryan Stolte on September 9, 2016

    When it comes to defending against today’s most sophisticated criminals, it truly takes a village. And I don’t mean solely ensuring employees use strong passwords and avoid clicking on suspicious links. Security teams, line-of-business application owners and boards of directors all must proactively make security their business. Each stakeholder plays a role in ensuring the most severe threats are…

  • A Few Thoughts on Automating Security to Improve Effectiveness

    by RSAC Contributor on August 29, 2016

    By Bret Hartman, Vice President and CTO, Cisco Security Business Group During RSA 2016, I led a Peer2Peer discussion titled Is Automation the Answer for Security in the Digital World? My goal for this session was to gain insight regarding different ways the automation of security operations might improve defenses—as well as the benefits, risks and limitations of those approaches. A number of…

  • Summer Slacking: 8 Security Mistakes Your Users Are Making

    by Ryan Berg on August 9, 2016

    As an IT professional, you’re expected to be always on. But for your users, it’s summertime, and that means BBQ’s and beer (although in Texas that’s pretty much year round.) With cookouts to host and vacations to plan, following your company’s security policies to the letter isn’t going to be the first thing on your users’ minds. Here are seven mistakes your users are prone to making during the…

  • Good Security Belongs in the Background

    by Rook Security on August 4, 2016

    By Mike Patterson You may have read that Jason Bourne took the #1 spot at the domestic box office last weekend, with $60 million in ticket sales—one of the better debuts of the summer. That translates into approximately 6 million people seeing the movie, and probably less than a dozen noticed the minor role Rook Security and I played in the fictitious Exocon show at the Aria in the second half of…

  • Delivering on Digital: The Innovators and Technologies That Are Transforming Government

    by Ben Rothke on July 17, 2016

    The debacle of the Healthcare.gov launch in 2013 was one the biggest public IT failures in history. There have been hundreds of articles written on the myriad reasons for the failure. In Delivering on Digital: The Innovators and Technologies That Are Transforming Government (RosettaBooks 0795347510), author William Eggers showcases the other side of the story, the many cases where government IT…

  • The Importance of Developing Cybersecurity Resilience in the Middle East

    by Stephen Brennan on July 8, 2016

    The Middle East features a complex mix of developed and developing economies, with varying levels of infrastructure deployment, and ICT connectivity. Compounding these variances are the geo-political overtures present in the region, which create a patchwork of allies and adversaries in a concentration that is probably not found anywhere else on the planet. Security experts understand that…

  • RSA Conference Greatest Hits: June 2016

    by Jennifer Lawinski on July 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of June this year? Top Blog Posts 1. The Dangers of…

  • Succeeding in Security

    by Ryan Berg on July 6, 2016

    If you are in the midst of a career change, you might want to consider entering the cybersecurity market, expected to grow from $75 billion in 2015 to $170 billion by 2020. More than 209,000 cybersecurity jobs in the U.S. are unfilled, and as worldwide cyber threats become more sophisticated and prevalent, organizations are depending on security professionals for their success. Of course, this…

  • The Future of Cloud Security Starts with the Hypervisor

    by Liviu Arsene on June 28, 2016

    The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, and Gartner estimates it has reached its peak, having significantly matured. OS container-based virtualization and cloud computing have gained in popularity, with organizations' server virtualization rates reaching up to 75 percent. While hypervisor technologies have been split into Type 1 (native – or bare…

This document was retrieved from https://www.rsaconference.com/blogs on Fri, 30 Sep 2016 02:38:16 -0400.
© 2016 EMC Corporation. All rights reserved.