Menu

Blogs

Showing Blog Posts: 1–10 of 170 tagged Security

  • South by South Security: Blockchain, IoT, cyber legislation and more

    by RSAC Editorial Team on March 24, 2017

    Q1 can be an interesting time for many members of our community. Kicking off a new year typically means starting new budgets, new campaigns for various products/services and visiting tradeshows across the globe to meet with prospective customers. We appreciate the time our community spends in our halls, knowing many of them also have events like HiMSS, Mobile World Congress and SXSW on their…

  • Audio Content Security: Attack Analysis on Audio Watermarking

    by Ben Rothke on February 21, 2017

    Watermarking is a covert marker meant to identify ownership. It has long been used in various forms to protect physical and digital products. For digital media, it’s used to protect copyright, intellectual property, content and more. If that watermark is attacked and compromised, the underlying security will be of no use. In Audio Content Security: Attack Analysis on Audio Watermarking (Syngress…

  • Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

    by Ben Rothke on December 18, 2016

    In chapter 2 of Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis (Syngress ISBN 978-0128033401), authors Brett Shavers and John Bair discuss the Tor browser and how it can offer tremendous levels of security and privacy. Their goal in the book is to help security professionals and investigators use investigative techniques against those employing such…

  • Maintaining Security When IT is on Holiday

    by Nathan Eddy on December 5, 2016

    With the holiday season fast approaching—they’re playing Jingle Bells in the department stores across the land—businesses need to be ready for the periods when IT security staff will be enjoying time with friends and family. The job of the IT pro isn’t likely to get easier anytime soon, and this is especially true during the holidays when employees are out of the office and expect to remain…

  • How to Protect Your Business When Your Cybersecurity Team Is Understaffed

    by Nathan Eddy on November 14, 2016

    There is a negative unemployment rate in IT security, which has led to a shortage of available talent in the market, with many firms unable to attract or evaluate key security talent. According to a Peninsula Press analysis of numbers from the Bureau of Labor Statistics, there were 209,000 unfilled cybersecurity jobs in the U.S. in 2015, with information security job postings up 74 percent in the…

  • How to Avoid Wasting Time on False Positives

    by Carl Manion on November 7, 2016

    False positives. Those annoying notifications that make you panic at first, but after further investigation, turn out to be nothing to worry about. At first, they may seem like a minor inconvenience, but what happens when you have hundreds—or even thousands—of them occurring every day and you find yourself wasting 75 percent (or more) of your time? Unfortunately, this is exactly what’s happening…

  • An Open Letter to Our Next President

    by WhiteHat Security on November 4, 2016

    Dear Future President, Thank you so much for using computer security as a talking point in your campaign this season. Allow me to personally say that, as a computer security professional, your bringing this issue more firmly into the spotlight can only be a good thing. If I may be so bold as to speak for many of my past, present, and future colleagues, having our industry made a conversation…

  • RSA Conference 2016 Abu Dhabi: Know Before You Go

    by Jennifer Lawinski on October 27, 2016

    RSA Conference 2016 Abu Dhabi kicks off in just a few weeks, and we've created a program that brings together some of the sharpest cybersecurity minds on the international scene to share information, network with peers, and learn about the latest and greatest new technologies. The week kicks off with our Learning Lab and Security Foundations Seminar on Monday. Cyber-Crisis Response—Live Exercise…

  • Internet of Things: It’s Not Just the Devices!

    by Ed Skoudis on October 24, 2016

    With the holiday season around the corner, families are about to introduce a new raft of high-tech, Internet-connected gadgets into their homes worldwide. At the same time, enterprises are increasingly deploying automated building control systems and lighting technologies. Local governments are also getting in on the act as the move toward smart cities gathers steam. These advancements represent…

  • We Have Entered the New Cyber Reality, But Are We Ready?

    by Chenxi Wang on October 12, 2016

    During the U.S. presidential debate on September 26, the moderator asked the two candidates to address the following topic: Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it? The very fact that this topic has moved beyond IT whiteboards and corporate boardrooms and into the national Situation Room indicates that we…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 23 Jun 2017 11:26:17 -0400.
© 2017 EMC Corporation. All rights reserved.