Menu

Blogs

Showing Blog Posts: 1–10 of 124 tagged Policy and Government

  • Cyber Pearl Harbor, Global Pandemic or Alien Invasion?

    by Todd Inskeep on May 18, 2017

    For over twenty years, experts have warned of a “Cyber Pearl Harbor.” Like the Dec.7, 1941 attack, this cyber-attack would both create tremendous damage and galvanize organizations, particularly in the US, to improve computer and information security. For nearly as long, other experts have spoken against this scenario, positing alternative scenarios and analogies. All-in-all, there’s been a…

  • Reactions to the US Cybersecurity Executive Order

    by RSAC Editorial Team on May 16, 2017

    After months of waiting, the security industry received an update from the US government on its promised focus on cybersecurity. Late last week President Trump signed the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Although other recent policies have been met with a variety of opinions across both sides of the aisle, this…

  • Building an Internet of Things Risk Model in the Wake of Mirai

    by Gib Sorebo on December 30, 2016

    For many of us, Internet of Things (IoT) security has been nothing more than a cocktail party conversation. It sounds interesting but doesn’t necessarily affect our work or personal lives even if our job includes cybersecurity. While it is clearly a concern for operators of medical devices or industrial control systems, it seems less relevant for the typical enterprise or consumer. After all, …

  • The Weaponization of IoT: A Shot Across The Bow – What We Must Do Today

    by Craig Spiezle on December 19, 2016

    IoT devices continue to make headlines for their innovation and as new holiday gifts, with millions of new devices being sold weekly. But with the proliferation of these new devices comes a sobering reality: they are introducing new threats daily. There is real and present danger here, and it will only get worse. While we have experienced devices being compromised and taken over in the past…

  • The Worrisome State of Nation-State Cyberattacks

    by RSAC Contributor on November 11, 2016

    By Alberto Yépez, Managing Director, Trident Capital Cybersecurity * In September, Yahoo reported that “state-sponsored” hackers stole data on about 500 million users in 2014, probably the largest-ever publicly disclosed cyber-breach. In addition to compromising personal identity data and consumer privacy on a massive scale, this is prodding Verizon Communications to consider renegotiating its…

  • An Open Letter to Our Next President

    by WhiteHat Security on November 4, 2016

    Dear Future President, Thank you so much for using computer security as a talking point in your campaign this season. Allow me to personally say that, as a computer security professional, your bringing this issue more firmly into the spotlight can only be a good thing. If I may be so bold as to speak for many of my past, present, and future colleagues, having our industry made a conversation…

  • Election 2016: The State of Cybersecurity

    by Jennifer Lawinski on September 27, 2016

    In the first debate of the 2016 presidential election at Hofstra University, candidates Donald Trump and Hillary Clinton sounded off on the state of cybersecurity. It was a watershed moment for cybersecurity—bringing the work you do into the forefront of the public consciousness and showing that cybersecurity is vital to our national security. But that hasn't always been the case. Jeff Greene, …

  • RSA Conference: Our Most Popular Posts from August 2016

    by Jennifer Lawinski on September 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of August this year? Top Blog Posts 1. Dissed by NIST:…

  • Dissed by NIST

    by Wendy Nather on August 19, 2016

    In the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management—and isn’t that a mouthful, even if you’re reading silently to yourself?—the authors have come out with the following bombshell: Due to the risk that SMS messages may be intercepted or redirected, implementers of new systems SHOULD carefully consider…

  • Bruce Schneier Talks About Securing the World-Sized Web at RSAC APJ 2016

    by Jennifer Lawinski on July 21, 2016

    What’s going to happen to our world as more of our devices come online as the Internet of Things explodes? That was the question Bruce Schneier, Chief Technology Officer of Resilient and security technologist, asked with his keynote address at RSA Conference Asia Pacific & Japan 2016 in Singapore. Schneier began by addressing the importance of the Internet of Things. “It’s a buzzword but I think…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 23 May 2017 22:13:51 -0400.
© 2017 EMC Corporation. All rights reserved.