Menu

Blogs

Showing Blog Posts: 1–10 of 109 tagged Privacy

  • Privacy and Cybersecurity in Education: A Constant Battle

    by Ayse Kaya Firat on January 31, 2017

    Millions of institutions across all industries have embraced cloud computing, seeing improvements in productivity, customer service, and cost savings. Yet cloud is impacting one industry at a larger scale than others: Education. Cloud is opening a new world of possibilities to students from across the globe, granting them access to a rich array of training resources, eliminating expensive and…

  • Financial Cybersecurity Regulations Are a Win for Privacy

    by Tom Boyden on January 30, 2017

    Beginning this year, financial and insurance companies in the state of New York will have to comply with some of the country’s most stringent and far-reaching cybersecurity regulations. In September, Governor Andrew Cuomo announced the new rules, which are meant to protect consumers, companies, and our financial infrastructure from the growing threat of cyberattacks. The regulations in their…

  • As Usual, New Technology Means New Privacy Considerations

    by Sam Pfeifle on January 28, 2017

    The financial services industry is certainly no stranger to privacy regulations. In fact, most people point to the Fair Credit Reporting Act as the first real privacy regulation with teeth in the world. So, you’d think people would have sorted out how to comply by now, right? Well, sometimes it’s not so easy. New technological capabilities are changing the way we think about “credit scoring” and…

  • Getting Users Committed to Security: Simple tips to increase user interest and commitment around common threats to their system

    by Jack Danahy on January 26, 2017

    Users are vulnerable to clever malware campaigns and social engineering, making them a common first link in the attack chain. Even in major breaches and ransomware attacks affecting multiple systems or sizable organizations, the entry point is usually created by a single mistake made by some unwitting user. These mistakes are also a meaningful distraction for IT teams, as more than 50% of the…

  • Security and Privacy is Sometimes Suspect, but Growth of the Cloud Marches On

    by Robert Ackerman Jr. on January 12, 2017

    We increasingly hear that the most-discussed computing paradigm, cloud computing – especially the public cloud -- is resuming its sharp rate of growth after a lull and poised to accelerate further. This is refreshing news in a world ever-more obsessed with security, underscoring that cloud purveyors are making progress in getting security right. The attractions of cloud computing are obvious to…

  • The Weaponization of IoT: A Shot Across The Bow – What We Must Do Today

    by Craig Spiezle on December 19, 2016

    IoT devices continue to make headlines for their innovation and as new holiday gifts, with millions of new devices being sold weekly. But with the proliferation of these new devices comes a sobering reality: they are introducing new threats daily. There is real and present danger here, and it will only get worse. While we have experienced devices being compromised and taken over in the past…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

  • Top Things Even Security Experts Forget

    by Todd Inskeep on September 28, 2016

    National Cyber Security Awareness Month in October marks a good time for all organizations to think about how they can build and reinforce a workplace culture of security and privacy. This security culture has to be created, fed and reinforced through an investment in activities and engaging training materials throughout the year—not only during the annual security training meetings. As…

  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

    by Ben Rothke on September 6, 2016

    Bitcoin is a topic that evokes a sort of whodunit to many people. Created by an international man of mystery named Satoshi Nakamoto, it leads many to think this is a protocol that lends itself to a John Grisham novel. Many even think Bitcoin is a government conspiracy. But none of that could be further from the truth. As in introduction, Bitcoin is a digital currency and payment system created by…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 30 Mar 2017 18:42:49 -0400.
© 2017 EMC Corporation. All rights reserved.