Menu

Blogs

  • The New Security Boundaries and How to Protect Them

    by Peter Merkulov on September 23, 2016

    Leading image

    The traditional network perimeter is a relic—a vestige of a time before the advent of easy mobility. And security strategies that focus on traditional perimeter defense are a symptom of change resistance and of a fixation on the past rather than a vision for the future. Consider this; the latest Ericsson mobility report says that 90 percent of the world’s population over the age of six will own a smartphone by 2020. That’s a lot of devices in the hands of as many as 6.6 billion people. And as…

  • The Rise of Nation-State Cyber Attacks Makes Encryption More Crucial Than Ever

    by Robert Ackerman Jr. on September 20, 2016

    No entity is immune from a cyber attack. A successful, jaw-dropping cyber assault against a seemingly impenetrable target occurred again last month. This time, the humbled target was the National Security Agency, the nation’s premier electronic eavesdropper. Three hundred megabytes of sophisticated code developed by the NSA to penetrate computer security systems was posted online for all to see. …

  • Getting Everyone on Board with Cybersecurity

    by Steve Sheck on September 16, 2016

    It’s shocking to those of us who work in the industry, but people still do not take cybersecurity seriously. How many people do you work with who still use “abc1234!” as a password? Or say things like “I haven’t updated my phone’s OS in months?” Many think of cybersecurity like a home defense system. You push a button, and the house (your organization) is secure. That’s not the case. Imagine if, …

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Elite Cyber Security Teams: Why They Matter and How to Train Them

    by Juan Bocanegra on September 13, 2016

    The average U.S. company of 1,000 employees or more spends $15 million a year fighting cyber crime, a 20% increase over last year, according to the Ponemon Institute. Hacking attacks cost the average U.S. organization $15.4 million per year—more than double the global average of $7.7 million. One of the reasons for the exorbitant costs of fighting cyber crime is that it now takes an average of 46…

  • It Takes a Village to Manage Cyber Risk

    by Ryan Stolte on September 9, 2016

    When it comes to defending against today’s most sophisticated criminals, it truly takes a village. And I don’t mean solely ensuring employees use strong passwords and avoid clicking on suspicious links. Security teams, line-of-business application owners and boards of directors all must proactively make security their business. Each stakeholder plays a role in ensuring the most severe threats are…

  • RSA Conference: Our Most Popular Posts from August 2016

    by Jennifer Lawinski on September 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of August this year? Top Blog Posts 1. Dissed by NIST:…

  • Perfecting Risk-Based Authentication: Applying the Right Tools to Lessen Risk

    by Gasan Awad on September 7, 2016

    Eighty percent of respondents to Kroll’s Global Fraud Report 2015/2016 said their organizations became more vulnerable to fraud in the past year. This means organizations need to be more aggressive in their collective approach to keeping fraud under control, including using a combination of fraud mitigation, identity proofing and account validation. In today’s competitive market, organizations…

  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

    by Ben Rothke on September 6, 2016

    Bitcoin is a topic that evokes a sort of whodunit to many people. Created by an international man of mystery named Satoshi Nakamoto, it leads many to think this is a protocol that lends itself to a John Grisham novel. Many even think Bitcoin is a government conspiracy. But none of that could be further from the truth. As in introduction, Bitcoin is a digital currency and payment system created by…

  • What’s a Trusted Technology Provider and How Do I Know One When I See One?

    by RSAC Contributor on September 5, 2016

    By Robert Martin, Sr. Principal Engineer, MITRE, MITRE On Tuesday March 1, as part of the What’s a Trusted Technology Provider and How Do I Know One When I See One? Peer2Peer session at RSA Conference 2016, about 30 people from around the world in industry, government, and academia, met and discussed the various aspects, challenges, and opportunities of finding and recognizing trustworthy…

  • Why Study Cybersecurity?

    by Gib Sorebo on September 4, 2016

    Recently, I started exploring ways I could be a stronger advocate for a course of study and a career in cybersecurity to students at the University of Chicago, my alma mater. For many attending elite schools, careers in anything information technology strike many as too vocational. In fact, for years, the University of Chicago didn’t even offer an undergraduate degree in Computer Science. …

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Sat, 24 Sep 2016 20:18:23 -0400.
© 2016 EMC Corporation. All rights reserved.