Menu

Blogs

Showing Blog Posts: 1–10 of 56 tagged Security Operations

  • DNS Security: Defending the Domain Name System

    by Ben Rothke on November 22, 2016

    That you are reading this review, and my ability to post it are due in large part due to the Domain Name System (DNS). DNS is Wikipedia describes it is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most…

  • How to Avoid Wasting Time on False Positives

    by Carl Manion on November 7, 2016

    False positives. Those annoying notifications that make you panic at first, but after further investigation, turn out to be nothing to worry about. At first, they may seem like a minor inconvenience, but what happens when you have hundreds—or even thousands—of them occurring every day and you find yourself wasting 75 percent (or more) of your time? Unfortunately, this is exactly what’s happening…

  • Innovation Sandbox: Winning Took Phantom to the Next Level

    by Jennifer Lawinski on November 2, 2016

    The competition was fierce at last year’s Innovation Sandbox competition at the RSA Conference 2016 in San Francisco. Companies duked it out, giving three-minute presentations to a panel of judges tasked with choosing the most innovative company at the conference. When all was said and done, the judges had chosen Phantom, a security automation and orchestration platform startup. How has winning the…

  • Cybersecurity and Applied Mathematics

    by Ben Rothke on October 26, 2016

    Mathematics is an integral (no pun intended) part of information security and cryptography. The RSA cryptosystem is one of many examples—its foundation is based on mathematics. The core security of RSA is based on the practical difficulty of factoring the product of two very large prime numbers, known as the factoring problem. In elliptic curve cryptography (ECC), its security is based on the…

  • Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

    by Ben Rothke on September 25, 2016

    Dr. Karyn Hall wrote The Emotionally Sensitive Person: Finding Peace When Your Emotions Overwhelm You to help such people identify emotional triggers, and to develop strong and healthy identity without becoming upset. When it comes to the world of building equipment, while these systems look tough and resilient on the outside, they are often quite sensitive and vulnerable. In Cyber-Physical…

  • It Takes a Village to Manage Cyber Risk

    by Ryan Stolte on September 9, 2016

    When it comes to defending against today’s most sophisticated criminals, it truly takes a village. And I don’t mean solely ensuring employees use strong passwords and avoid clicking on suspicious links. Security teams, line-of-business application owners and boards of directors all must proactively make security their business. Each stakeholder plays a role in ensuring the most severe threats are…

  • Good Security Belongs in the Background

    by Rook Security on August 4, 2016

    By Mike Patterson You may have read that Jason Bourne took the #1 spot at the domestic box office last weekend, with $60 million in ticket sales—one of the better debuts of the summer. That translates into approximately 6 million people seeing the movie, and probably less than a dozen noticed the minor role Rook Security and I played in the fictitious Exocon show at the Aria in the second half of…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • Cybersecurity Pros Are in High Demand

    by Jennifer Lawinski on April 6, 2016

    When it comes to cybersecurity, there simply aren’t enough of you. Despite being faced with escalating cyber threats, and having the support of corporate executives, security teams are still struggling to fill their open positions. That’s what we learned when we partnered with ISACA on our recent survey, State of Cybersecurity: Implications for 2016. More than half of security job openings take…

  • Defense in Depth Is Necessary, But Not Sufficient: Five Best Practices for Managing and Controlling Third-Party Risk

    by RSAC Contributor on March 22, 2016

    This post was written by Mordecai Rosen, ‎General Manager, Security, CA Technologies. If data breaches such as those experienced by Home Depot, Target and Anthem taught us anything, it is that defense in depth needs a boost to include defense in breadth. Nearly two-thirds of companies extensively or significantly use third-party solutions in their organizations. Relying on a partner’s security and…

This document was retrieved from https://www.rsaconference.com/blogs on Sun, 11 Dec 2016 02:55:31 -0500.
© 2016 EMC Corporation. All rights reserved.