Menu

Blogs

Showing Blog Posts: 1–10 of 167 tagged Security

  • Maintaining Security When IT is on Holiday

    by Nathan Eddy on December 5, 2016

    With the holiday season fast approaching—they’re playing Jingle Bells in the department stores across the land—businesses need to be ready for the periods when IT security staff will be enjoying time with friends and family. The job of the IT pro isn’t likely to get easier anytime soon, and this is especially true during the holidays when employees are out of the office and expect to remain…

  • How to Protect Your Business When Your Cybersecurity Team Is Understaffed

    by Nathan Eddy on November 14, 2016

    There is a negative unemployment rate in IT security, which has led to a shortage of available talent in the market, with many firms unable to attract or evaluate key security talent. According to a Peninsula Press analysis of numbers from the Bureau of Labor Statistics, there were 209,000 unfilled cybersecurity jobs in the U.S. in 2015, with information security job postings up 74 percent in the…

  • How to Avoid Wasting Time on False Positives

    by Carl Manion on November 7, 2016

    False positives. Those annoying notifications that make you panic at first, but after further investigation, turn out to be nothing to worry about. At first, they may seem like a minor inconvenience, but what happens when you have hundreds—or even thousands—of them occurring every day and you find yourself wasting 75 percent (or more) of your time? Unfortunately, this is exactly what’s happening…

  • An Open Letter to Our Next President

    by WhiteHat Security on November 4, 2016

    Dear Future President, Thank you so much for using computer security as a talking point in your campaign this season. Allow me to personally say that, as a computer security professional, your bringing this issue more firmly into the spotlight can only be a good thing. If I may be so bold as to speak for many of my past, present, and future colleagues, having our industry made a conversation…

  • RSA Conference 2016 Abu Dhabi: Know Before You Go

    by Jennifer Lawinski on October 27, 2016

    RSA Conference 2016 Abu Dhabi kicks off in just a few weeks, and we've created a program that brings together some of the sharpest cybersecurity minds on the international scene to share information, network with peers, and learn about the latest and greatest new technologies. The week kicks off with our Learning Lab and Security Foundations Seminar on Monday. Cyber-Crisis Response—Live Exercise…

  • Internet of Things: It’s Not Just the Devices!

    by Ed Skoudis on October 24, 2016

    With the holiday season around the corner, families are about to introduce a new raft of high-tech, Internet-connected gadgets into their homes worldwide. At the same time, enterprises are increasingly deploying automated building control systems and lighting technologies. Local governments are also getting in on the act as the move toward smart cities gathers steam. These advancements represent…

  • We Have Entered the New Cyber Reality, But Are We Ready?

    by Chenxi Wang on October 12, 2016

    During the U.S. presidential debate on September 26, the moderator asked the two candidates to address the following topic: Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it? The very fact that this topic has moved beyond IT whiteboards and corporate boardrooms and into the national Situation Room indicates that we…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • The Longevity Challenge in Infosec

    by Wendy Nather on October 4, 2016

    In a recent BankInfoSecurity article, U.S. Federal Chief Information Officer Tony Scott was quoted as saying one of the main factors behind the OPM breach was the tendency of Congress to “fund civilian agencies to maintain their information systems, not to modernize them.” This is endemic both in the public sector and in other organizations below the security poverty line, which I started writing…

  • Embracing the Power of Opportunity During Cyber Security Awareness Month: Stop. Think. Connect.

    by Sandra Toms on October 3, 2016

    October marks National Cyber Security Awareness Month: a great opportunity for all of us to take a moment to think about how we are protecting ourselves in this increasingly connected world. This reminder applies to everyone: from the CISO, to the college student interested in exploring a career in the security industry, to the mom curious how to bridge a conversation with her children about…

This document was retrieved from https://www.rsaconference.com/blogs on Thu, 08 Dec 2016 20:50:22 -0500.
© 2016 EMC Corporation. All rights reserved.