Menu

Blogs

Showing Blog Posts: 1–10 of 24 tagged Training

  • Detecting Attacks Takes More Than Just Having the Latest Tools

    by Gib Sorebo on April 27, 2016

    In this fascinating Peer2 Peer session How Do You Detect Attacks? participants representing enterprise customers, product vendors, and service providers all weighed in on some of the challenges they face detecting attacks. Many were monitoring their networks 24/7 with either in-house staff or managed security services providers. While there was some critique of the products they used and their…

  • 11 Strategies to Consider in Addressing the Cybersecurity Skill Shortage

    by RSAC Contributor on April 18, 2016

    By Alberto Yépez, managing director of early stage venture capital firm Trident Capital Cybersecurity The cybersecurity industry has a talent shortage, yet not many realize just how severe it is. And, more importantly, they don’t realize what corporations struggling with the problem must do to get a grip on it. To solve the challenge, corporations must develop new hiring and training strategies…

  • RSA President Amit Yoran: 'Our Problem Isn't a Technology Problem'

    by Tony Kontzer on March 1, 2016

    When Amit Yoran took the stage for his keynote address at this week's RSA Conference in San Francisco, most of the thousands of attendees in the audience probably expected to hear about how a new generation of security technologies would help companies get a leg up on the growing array of threats they face today. What they didn't expect was to be told that the greatest weapons in their security…

  • Securosis Guide: Training Security Jedi

    by Securosis Team on February 17, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. The lack of security Jedi is disturbing. With the evil forces of the Empire running rampant through all of the members of the Republic, there just aren’t enough skilled practitioners trained in using the Security…

  • Security Awareness Training: We're Doing it Wrong!

    by Rook Security on March 3, 2015

    This post comes from Arlie Hartman, a senior security advisor at Rook Security. It’s a relentless mantra in information security community: “People are the weakest link.” The success of email phishing, watering hole attacks, and over-the-phone social engineering tactics proves that attackers just have to target people in order to sidestep several layers of defense in depth measures. Most security…

  • Fire in the Valley: The Birth and Death of the Personal Computer

    by Ben Rothke on December 18, 2014

    In Fire in the Valley: The Birth and Death of the Personal Computer, authors Michael Swaine and Paul Freiberger provide a thoroughly enjoyable read of the history and development of the PC. As timing would have it, Michael Swain was editor of Dr. Dobb's Journal, which this week announced it would be ceasing publication in 2015 after nearly 40 years in print. The valley in the title is Silicon…

  • Making Room for Security Training in Your Budget

    by Fahmida Y. Rashid on October 13, 2014

    When there are so many security threats demanding our attention and initiatives needing funding, it can be difficult to decide how to allocate the security budget. Security awareness training goes beyond preventing some attacks to improving an organization's overall security posture. Over the past few months, we've seen attackers increasingly relying on phishing and other social engineering…

  • Cybersecurity Requires Qualified Personnel

    by Christopher Burgess on September 25, 2014

    The community of cybersecurity professionals is an energetic, creative, and highly sought-after one. It's also incredibly small, with hiring demands outpacing available supply of professionals. Ask your chief information security officer, chief information officer, or chief security officer if they have all the information security personnel they want, and the answer will be almost always be a…

  • Cybercrime and Effective Cyber Law Enforcement

    by Robert Moskowitz on August 19, 2014

    These days, it's rare to open a news source (print or digital) without finding a story about cybercrime. Cybercriminals are hacking into databases, stealing credit and debit card account numbers, compromising individuals' identities, and shutting down legitimate websites. These articles highlight how necessary cyber law enforcement has become.Although data security budgets keep climbing and…

  • Security Awareness: Applying Practical Security in Your World

    by Ben Rothke on July 22, 2014

    Security awareness is a vital part of information security. Just how important is it? In September, the 10-day SANS Security Awareness Summit 2014 will cover every aspect of the topic. For those that want to get an appreciation for the topic but can’t make it to Dallas for the Summit, Security Awareness: Applying Practical Security in Your World is a good resource for the reader that wants both an…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Sat, 30 Jul 2016 16:39:14 -0400.
© 2016 EMC Corporation. All rights reserved.