Menu

Blogs

  • HIPAA, GDPR and the Dreaded “Second Hop” Security Problem

    by Salvatore J. Stolfo on June 18, 2018

    Leading image

    Malicious attacks targeting a healthcare company’s confidential data are nothing new. The industry has lived under the stringent HIPAA requirements for years and many have made great strides deploying systems to manage and protect their data. What is disturbing, however, is the number of breaches that still occur. A recent example: LifeBridge is just now disclosing a breach that happened in September 2016 and affected the personal information of 500,000 patients. What's interesting and relevant…

  • Diversity with a Side of Caffeine

    by Sandra Toms on June 14, 2018

    Early Wednesday morning of RSAC US week, we asked a group of co-collaborators to work with us to help improve the diversity of RSA Conference. A broad spectrum of people were represented – some long-term RSAC attendees and some new to information security – all of various ages, genders, geographies, verticals, positions and ethnicities. In exchange for the 90-minute session, we promised the…

  • Cybersecurity Framework 1.1 Adoption Experiences and Opportunities

    by Timothy Shea on June 12, 2018

    The NIST Cybersecurity Framework was released in February 2014. At the 2015 RSA Conference I hosted a peer-to-peer (P2P) session on the framework: Cybersecurity Framework - Adoption Experiences and Opportunities. While the room was full, including participation from NIST - conveyors of the Framework – there were very few people who had implemented the Framework, but many who planned to. Also in…

  • Yep, I Suggested Monica

    by Sandra Toms on June 7, 2018

    Have you ever had that awkward pause moment when you make a suggestion, and people look at you like you have a third eye? It feels like second nature to me! I don’t consider myself an “events person,” but I’m responsible for one of the world’s largest cybersecurity events. So, imagine the awkward pause moment I had when I suggested we have Monica Lewinsky keynote at RSA Conference. Most people…

  • Between the Lines: Takeaways from RSA Conference 2018 and How They Apply to the Future of Enterprise Security

    by Anne Baker on June 4, 2018

    This year’s RSA Conference was buzzing. Everywhere you turned, thought-provoking discussions on the security industry’s biggest challenges were taking place. Although the seriousness of this past year’s proliferation of cyberattacks hung in the air, there was no doubt that the mood was upbeat and there was a lot of positive momentum. After taking a breath to process the content and conversations…

  • Ben's Book of the Month: Review of “Zero Trust Networks: Building Secure Systems in Untrusted Networks”

    by Ben Rothke on May 31, 2018

    The notion of a zero trust networks (ZTN) was created in 2010 by John Kindervag, then of Forrester. Kindervag felt that as enterprises moved slowly towards a data-centric world with shifting threats and perimeters, a new concept of what constituted a secure network had to be created. It was ahead of its time and to a degree still is. In a world of zero trust, all network traffic is considered…

  • Report: Many Companies Taking Status Quo Approach to Cyber Security at Their Own Peril

    by Tony Kontzer on May 29, 2018

    At the recent RSA Conference in San Francisco, attendees heard a lot of recognition that the cyber security landscape is in flux. A new generation of technologies that generate unprecedented amounts of data has changed the playing field, as has the rise of artificial intelligence. This has resulted not just in more things to secure and more insight to work with, it also has led to an adversary…

  • Hackers and Threats Abound For GDPR, Emperor Snoke

    by RSAC Editorial Team on May 24, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is the final post of a five-part monthly series we kicked off in January 2018 to take a look at how technology, topics and trends from the cybersecurity world compare to characters and themes from the blockbuster Star Wars films. We hope you enjoy our blog series in which the Resistance, filled with hope and determination, …

  • Proactivity and Speed Have Become Essential Components of Cybersecurity

    by Sean Cunningham on May 22, 2018

    Fundamentally, there are two major reasons why enterprises get breached despite ever-increasing cybersecurity budgets. They are typically related to insufficient proactive intelligent threat analysis and addressing advanced malware as it enters an enterprise computer system or network too slowly. Companies can take up to four months to address critical vulnerabilities and, on average, more than…

  • Resources for the Community: USA Today’s Homeland Security Edition 2018

    by RSAC Editorial Team on May 17, 2018

    Already one-third of the way through 2018 (how did that happen?), many of us are still catching our breath from April in what was a packed month culminating in another great week out in San Francisco at RSA Conference 2018. With so many great discussions taking place last month, we hope all of you were able to take part in the event and come away inspired by our industry, and ready to engage and…

  • Governments Worldwide Appear to Be Hearing the Calls for Improved Cyber Security

    by Tony Kontzer on May 15, 2018

    Governments of all types have long proven to be challenged in the area of cyber security. Forget the long-standing jokes about government red tape and inefficiency; this isn't about not being able to get it done. It's about years of giving security short shrift. Consider that the United Nations' second annual Cyber Security Index released last summer indicated that just 38 percent of the world's…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 19 Jun 2018 12:09:41 -0400.