Showing Blog Posts: 1–10 of 156 tagged Security

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Cybersecurity Conventions: A Newcomer's Perspective

    by Dale "Woody" Wooden on August 31, 2016

    First, let me start by saying yes, I will be doing a follow-up to RFID blocking wallets. I’m still testing this material and only had one manufacturer who sent me equipment for the Pepsi Challenge. (You can send inquiries to But let me talk now about cybersecurtiy conferences. This year was my first attending one cybersecurity event and my second at another. I’m…

  • A Few Thoughts on Automating Security to Improve Effectiveness

    by RSAC Contributor on August 29, 2016

    By Bret Hartman, Vice President and CTO, Cisco Security Business Group During RSA 2016, I led a Peer2Peer discussion titled Is Automation the Answer for Security in the Digital World? My goal for this session was to gain insight regarding different ways the automation of security operations might improve defenses—as well as the benefits, risks and limitations of those approaches. A number of…

  • Good Security Belongs in the Background

    by Rook Security on August 4, 2016

    By Mike Patterson You may have read that Jason Bourne took the #1 spot at the domestic box office last weekend, with $60 million in ticket sales—one of the better debuts of the summer. That translates into approximately 6 million people seeing the movie, and probably less than a dozen noticed the minor role Rook Security and I played in the fictitious Exocon show at the Aria in the second half of…

  • Do Data Breaches Affect Company Value?

    by Liviu Arsene on July 29, 2016

    With malware growing more prevalent, possibly nearing 600 million samples in 2016, the average cost of a data breach has been estimated to reach $4 million. Gartner, which had estimated worldwide spending on information security reaching $75.4 billion in 2015, sees a 26 percent probability that a company will experience one or more data breaches within a 24-hour period. While fixing a data breach…

  • StoryCorps @ RSAC: You Cannot Have Privacy Without Security

    by Jennifer Lawinski on July 11, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. This month's conversation features a conversation between former RSA Executive Chairman Art Coviello, president of Art Coviello Associates, LLC and founder of the Digital Equilibrium Project, and …

  • The Importance of Developing Cybersecurity Resilience in the Middle East

    by Stephen Brennan on July 8, 2016

    The Middle East features a complex mix of developed and developing economies, with varying levels of infrastructure deployment, and ICT connectivity. Compounding these variances are the geo-political overtures present in the region, which create a patchwork of allies and adversaries in a concentration that is probably not found anywhere else on the planet. Security experts understand that…

  • The Future of Cloud Security Starts with the Hypervisor

    by Liviu Arsene on June 28, 2016

    The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, and Gartner estimates it has reached its peak, having significantly matured. OS container-based virtualization and cloud computing have gained in popularity, with organizations' server virtualization rates reaching up to 75 percent. While hypervisor technologies have been split into Type 1 (native – or bare…

  • Is the Security Profession too Arrogant?

    by Ira Winkler & Araceli Treu Gomes on June 24, 2016

    It is always interesting to see the comments that we get back from our presentations. This was especially true after our most recent RSA presentation on Advanced Persistent Security, a follow-up to our 2015 presentation, The Sophisticated Attack Myth, where we discussed that the most notable cybersecurity attacks were not due to sophisticated attackers, but rather a lack of basic security…

  • RSA Conference APJ 2016: Catching Up with Todd Inskeep

    by Jennifer Lawinski on June 10, 2016

    As RSA Conference Asia Pacific & Japan draws near, we sat down with RSA Conference Advisory Board member Todd Inskeep, Principal, Commercial Consulting, Booz Allen Hamilton, to talk about the cybersecurity landscape in Asia, and why RSA Conference APJ is more relevant now for attendees than ever before. RSA Conference: What’s unique about the APJ cybersecurity landscape? Inskeep: APJ cybersecurity…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from on Mon, 26 Sep 2016 20:12:09 -0400.
© 2016 EMC Corporation. All rights reserved.