Menu

Blogs

Showing Blog Posts: 1–10 of 105 tagged Privacy

  • Security and Privacy is Sometimes Suspect, but Growth of the Cloud Marches On

    by Robert Ackerman Jr. on January 12, 2017

    We increasingly hear that the most-discussed computing paradigm, cloud computing – especially the public cloud -- is resuming its sharp rate of growth after a lull and poised to accelerate further. This is refreshing news in a world ever-more obsessed with security, underscoring that cloud purveyors are making progress in getting security right. The attractions of cloud computing are obvious to…

  • The Weaponization of IoT: A Shot Across The Bow – What We Must Do Today

    by Craig Spiezle on December 19, 2016

    IoT devices continue to make headlines for their innovation and as new holiday gifts, with millions of new devices being sold weekly. But with the proliferation of these new devices comes a sobering reality: they are introducing new threats daily. There is real and present danger here, and it will only get worse. While we have experienced devices being compromised and taken over in the past…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

  • Top Things Even Security Experts Forget

    by Todd Inskeep on September 28, 2016

    National Cyber Security Awareness Month in October marks a good time for all organizations to think about how they can build and reinforce a workplace culture of security and privacy. This security culture has to be created, fed and reinforced through an investment in activities and engaging training materials throughout the year—not only during the annual security training meetings. As…

  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

    by Ben Rothke on September 6, 2016

    Bitcoin is a topic that evokes a sort of whodunit to many people. Created by an international man of mystery named Satoshi Nakamoto, it leads many to think this is a protocol that lends itself to a John Grisham novel. Many even think Bitcoin is a government conspiracy. But none of that could be further from the truth. As in introduction, Bitcoin is a digital currency and payment system created by…

  • Infrastructure as Code: Managing Servers in the Cloud

    by Ben Rothke on August 19, 2016

    Many organizations have entered the world of cloud services, only to find it is not the panacea that they were lead to believe it would be. For example, while it’s relatively easy to spin up new servers in AWS (Amazon Web Services), managing those servers once they are operational is not such an easy endeavor. In Infrastructure as Code: Managing Servers in the Cloud (O'Reilly Media ISBN-10:…

  • Get Ready for RSA Conference Asia Pacific & Japan 2016!

    by Jennifer Lawinski on July 18, 2016

    In just a few days RSA Conference Asia Pacific & Japan 2016 will kick off at the Marina Bay Sands in Singapore! Are you joining us? If you are, we have a packed program of world-class sessions, exceptional keynote speakers and networking opportunities for cybersecurity professionals that we hope exceeds your expectations. Before the conference officially opens, we invite you to check out the IAPP…

  • StoryCorps @ RSAC: You Cannot Have Privacy Without Security

    by Jennifer Lawinski on July 11, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. This month's conversation features a conversation between former RSA Executive Chairman Art Coviello, president of Art Coviello Associates, LLC and founder of the Digital Equilibrium Project, and …

  • Ever Heard of Cross-Border Privacy Rules? You Will

    by Sam Pfeifle on July 7, 2016

    Hopefully, if you’re working at a business in a country that touches the Pacific Ocean, you’ve heard of the Asia Pacific Economic Cooperation. No? Well, they’re a group of 22 nations, including everyone from the United States and Canada to Japan and Singapore to China and Australia, focused on making commerce amongst the nations easier for everyone involved. Part of that work involves e-commerce…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 24 Jan 2017 10:15:28 -0500.
© 2017 EMC Corporation. All rights reserved.