Menu

Blogs

Showing Blog Posts: 1–7 of 7 tagged Technology

  • So Many Topics at RSA Conference but What Does It All Mean?

    by RSAC Editorial Team on August 2, 2018

    Now that we are a few months out of RSA Conference 2018 and the summer months are upon us, we want to revisit the report that Wade Baker of Cyentia Institute and a member of the RSA Conference Advisory Board was able to compile earlier this year that examines more than 15,000 speaking submissions over the last decade at RSA Conference. Many of you have likely seen the report, or perhaps glanced at…

  • Can the Washington D.C. Metroplex Become a Major Hub for Cybersecurity Startups?

    by Mike Janke on March 27, 2018

    For many years, technology startup activity in the metropolitan Washington D.C. area has been respectable but very narrowly focused. Most of these startups, including cybersecurity companies, have traditionally targeted the federal government as their primary customer because the government has always been a much easier sell than the broad commercial market. This is rapidly changing, however, and…

  • The Lovable Defector and the Double-Edged Sword of Technology

    by RSAC Editorial Team on March 7, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is part three of a five-part monthly series to kick off 2018 in which we take a look at characters from the Star Wars saga and how technology, topics, and trends from the cybersecurity world compare to characters and themes from the blockbuster films. We hope you enjoy our blog series in which the Resistance, filled with…

  • FTP Is Dead. Long Live FTP!

    by Greg Hoffer on October 24, 2017

    The venerable File Transfer Protocol (or FTP) is going away. Kind of. Not really. In April, the Debian Project announced that it was killing its support of FTP services on November 1. Despite the Debian Project’s announcement, FTP won’t likely be faced with extinction just yet. Created in 1971, FTP has been around more than four decades. During that time, it has become ubiquitous, even if largely…

  • Ben's Book of the Month: Review of "IT Security Risk Control Management: An Audit Preparation Plan"

    by Ben Rothke on September 29, 2017

    This month the theme is technology, and when it comes to information security, there is a whole lot of that around. From firewalls to switches, IDS to SIEM, to a lot of other hardware and software with 3 and 4-letter acronyms, technology is at the heart of information security. But how does an enterprise ensure that the huge amounts they spend are implementing good security. That is where an…

  • Cybersecurity Automation Is Coming to the Rescue

    by Robert Ackerman Jr. on September 7, 2017

    Every now and then, it may seem as though the explosive growth of increasingly sophisticated, novel and successful cyberattacks is overwhelming. Who can keep up and fend off the attacks? Certainly not the federal government, and certainly not most major corporations. Further undermining a strong defensive posture is the swelling shortage of cybersecurity specialists– more than 1 million globally…

  • The UEBA Evolution: You Gotta Be a Wolf to Catch Coffee

    by Ryan Stolte on September 1, 2017

    I’d like to submit that the heyday of User and Entity Behavior Analytics (UEBA) technology is upon us, despite many preconceived notions. As CTO of a vendor that plays in this space, that theory shouldn’t surprise you; however, if you care to read on I feel that I can make a pretty good case. To be fair, the first generation of UEBA security products delivered some immediate value, yet also left…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 15 Oct 2018 10:49:46 -0400.