Menu

Blogs

Showing Blog Posts: 1–9 of 9 tagged Password

  • What’s Ahead for 2017: The RSAC Advisory Board Industry Predictions

    by Jennifer Lawinski on December 7, 2016

    After an eventful year, it can be comforting to put a framework around the uncertainty of the future and try to look ahead at what next year may bring. And it’s in that spirit that we talked to the RSA Conference Advisory Board to find out what they think will happen in the world of cybersecurity as we enter 2017. What’s the value of looking at predictions? According to Todd Inskeep, Principal, …

  • Top Things Even Security Experts Forget

    by Todd Inskeep on September 28, 2016

    National Cyber Security Awareness Month in October marks a good time for all organizations to think about how they can build and reinforce a workplace culture of security and privacy. This security culture has to be created, fed and reinforced through an investment in activities and engaging training materials throughout the year—not only during the annual security training meetings. As…

  • Dissed by NIST

    by Wendy Nather on August 19, 2016

    In the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management—and isn’t that a mouthful, even if you’re reading silently to yourself?—the authors have come out with the following bombshell: Due to the risk that SMS messages may be intercepted or redirected, implementers of new systems SHOULD carefully consider…

  • World Password Day 2016: How Do You Manage Your Passwords?

    by Jennifer Lawinski on May 5, 2016

    I recently signed up for the TSA Global Entry Pre-Check program, because as I'm going to be traveling for RSA Conference, I'll be spending quality time at JFK for more than just vacations. Why is this information I'm sharing with you on World Password Day 2016? Just two days after I created my account on the government's site, I was notified via email that there was a change in my application…

  • RSA Conference Asia Pacific Japan Friday Preview

    by Fahmida Y. Rashid on July 24, 2015

    There are 28 sessions to choose from on the final day of RSA Conference Asia Pacific & Japan 2015. While the first day of sessions offered a lot of region-specific content, the second is more general. Instead of being region-specific, the sessions are more strategic, providing insights on specific topics. Mobile payments is a popular topic, but it is a concept with a lot of traction in Asia. Many…

  • An Anthem to Get Behind: Enable Two-Factor Authentication

    by Eric Cowperthwaite on February 17, 2015

    In the security industry, we all know it’s just a matter of time, sometimes minutes, before the next breach makes headlines. We’re stopping and blocking attacks left and right, and it only takes that one time for a hacker to be right, that one mistake before we have to answer the question, “What happened?” The latest victim was Anthem, a huge health insurance provider who had 80 million customer…

  • The Human Element in the Data Breach

    by Christopher Burgess on November 17, 2014

    We are all familiar with the adage, "to err is human; to really foul things up requires a computer," which implies that the computer may be to blame for many data breach calamities. Alas, it appears the erring human is also culpable. Take, for example, the recent kerfuffle surrounding Apple's iCloud and the compromise of celebrity accounts containing salacious photos. After much slinging of…

  • Gatekeeper: What's New in OS X Mountain Lion Security

    by Ben Rothke on December 10, 2012

    OS X Mountain Lion, Apple’s latest operating system release from July 2012 introduces a number of new security features. For only 99 cents, Gatekeeper: What's New in OS X Mountain Lion Security, available for the Kindle, provides a good overview of these new features. Gatekeeper is an anti-malware feature in OS X and enables users to restrict which external sources they will allow software…

  • Two great lockpicking books from Deviant Ollam

    by Ben Rothke on December 5, 2012

    It is well known that the password, while the most widespread information security mechanism, is also one of the most insecure. It comes down to the fact that the average person can’t create and maintain secure passwords. When it comes to physical locks, the average lock on your home and in your office is equally insecure. How insecure it in? In two fascinating books on the topic, Deviant Ollam…

This document was retrieved from https://www.rsaconference.com/blogs on Wed, 07 Dec 2016 11:17:04 -0500.
© 2016 EMC Corporation. All rights reserved.