Menu

Blogs

  • StoryCorps @ RSAC: The Key Is Intellectual Curiosity

    by Jennifer Lawinski on September 29, 2016

    Leading image

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. What does it take to be successful in the world of cybersecurity? Security and perimeter experts Rich Mogull, CEO and analyst at Securosis, and Jim Routh, CSO and leader of the global information security function for AETNA sat down at the StoryCorps booth at the RSA Conference 2016 in San…

  • Top Things Even Security Experts Forget

    by Todd Inskeep on September 28, 2016

    National Cyber Security Awareness Month in October marks a good time for all organizations to think about how they can build and reinforce a workplace culture of security and privacy. This security culture has to be created, fed and reinforced through an investment in activities and engaging training materials throughout the year—not only during the annual security training meetings. As…

  • Election 2016: The State of Cybersecurity

    by Jennifer Lawinski on September 27, 2016

    In the first debate of the 2016 presidential election at Hofstra University, candidates Donald Trump and Hillary Clinton sounded off on the state of cybersecurity. It was a watershed moment for cybersecurity—bringing the work you do into the forefront of the public consciousness and showing that cybersecurity is vital to our national security. But that hasn't always been the case. Jeff Greene, …

  • Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

    by Ben Rothke on September 25, 2016

    Dr. Karyn Hall wrote The Emotionally Sensitive Person: Finding Peace When Your Emotions Overwhelm You to help such people identify emotional triggers, and to develop strong and healthy identity without becoming upset. When it comes to the world of building equipment, while these systems look tough and resilient on the outside, they are often quite sensitive and vulnerable. In Cyber-Physical…

  • The New Security Boundaries and How to Protect Them

    by Peter Merkulov on September 23, 2016

    The traditional network perimeter is a relic—a vestige of a time before the advent of easy mobility. And security strategies that focus on traditional perimeter defense are a symptom of change resistance and of a fixation on the past rather than a vision for the future. Consider this; the latest Ericsson mobility report says that 90 percent of the world’s population over the age of six will own a…

  • The Rise of Nation-State Cyber Attacks Makes Encryption More Crucial Than Ever

    by Robert Ackerman Jr. on September 20, 2016

    No entity is immune from a cyber attack. A successful, jaw-dropping cyber assault against a seemingly impenetrable target occurred again last month. This time, the humbled target was the National Security Agency, the nation’s premier electronic eavesdropper. Three hundred megabytes of sophisticated code developed by the NSA to penetrate computer security systems was posted online for all to see. …

  • Getting Everyone on Board with Cybersecurity

    by Steve Sheck on September 16, 2016

    It’s shocking to those of us who work in the industry, but people still do not take cybersecurity seriously. How many people do you work with who still use “abc1234!” as a password? Or say things like “I haven’t updated my phone’s OS in months?” Many think of cybersecurity like a home defense system. You push a button, and the house (your organization) is secure. That’s not the case. Imagine if, …

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Elite Cyber Security Teams: Why They Matter and How to Train Them

    by Juan Bocanegra on September 13, 2016

    The average U.S. company of 1,000 employees or more spends $15 million a year fighting cyber crime, a 20% increase over last year, according to the Ponemon Institute. Hacking attacks cost the average U.S. organization $15.4 million per year—more than double the global average of $7.7 million. One of the reasons for the exorbitant costs of fighting cyber crime is that it now takes an average of 46…

  • It Takes a Village to Manage Cyber Risk

    by Ryan Stolte on September 9, 2016

    When it comes to defending against today’s most sophisticated criminals, it truly takes a village. And I don’t mean solely ensuring employees use strong passwords and avoid clicking on suspicious links. Security teams, line-of-business application owners and boards of directors all must proactively make security their business. Each stakeholder plays a role in ensuring the most severe threats are…

  • RSA Conference: Our Most Popular Posts from August 2016

    by Jennifer Lawinski on September 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of August this year? Top Blog Posts 1. Dissed by NIST:…

This document was retrieved from https://www.rsaconference.com/blogs on Fri, 30 Sep 2016 07:47:12 -0400.
© 2016 EMC Corporation. All rights reserved.