Menu

Blogs

  • StoryCorps @ RSAC: The Kind of Folks You Run Into

    by Jennifer Lawinski on December 9, 2016

    Leading image

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. What did two cybersecurity luminaries study to get into the industry? Turns out, Bruce Schneier, CTO of Resilient Systems, and Hugh Thompson, a member of the RSA Conference Program Committee, took very different paths to where they are today. Thompson came from the world of math, and Schneier…

  • What’s Ahead for 2017: The RSAC Advisory Board Industry Predictions

    by Jennifer Lawinski on December 7, 2016

    After an eventful year, it can be comforting to put a framework around the uncertainty of the future and try to look ahead at what next year may bring. And it’s in that spirit that we talked to the RSA Conference Advisory Board to find out what they think will happen in the world of cybersecurity as we enter 2017. What’s the value of looking at predictions? According to Todd Inskeep, Principal, …

  • Awakening from the Dream: The Security Flaws of Westworld

    by RSAC Editorial Team on December 7, 2016

    *Warning this post or embedded links may contain spoilers. Welcome back newcomers, I hope you enjoyed your time in Sweetwater. The season finale of Westworld hit the Home Box Office crowd Sunday night drawing in 2.2 million viewers. For those unfamiliar with the premise: this new HBO series was inspired by the 1973 film of the same title (written by Michael Crichton) about a futuristic theme park…

  • Maintaining Security When IT is on Holiday

    by Nathan Eddy on December 5, 2016

    With the holiday season fast approaching—they’re playing Jingle Bells in the department stores across the land—businesses need to be ready for the periods when IT security staff will be enjoying time with friends and family. The job of the IT pro isn’t likely to get easier anytime soon, and this is especially true during the holidays when employees are out of the office and expect to remain…

  • Getting to Know the RSAC Advisory Board: Ed Skoudis

    by Jennifer Lawinski on December 2, 2016

    Name: Ed Skoudis Title and company: Instructor and Fellow, SANS Institute; Founder, Counter Hack Number of years in the information security industry: 20 RSAC: What was your first job in the infosec industry? Skoudis: Working at Bellcore helping the Baby Bells secure their early IP networks. RSAC: What does the RSA Conference 2017 theme, “The Power of Opportunity,” mean to you? Skoudis: Information…

  • 10 Attributes of a NextGen Security Program

    by Rook Security on November 30, 2016

    By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to…

  • Secure Data Deletion

    by Ben Rothke on November 30, 2016

    The law of conservation of energy is that energy remains constant; it can be neither created or destroyed. It simply transforms from one form to another. While not a perfect analogy, data on a hard drive or other physical media is quite difficult to completely transform to the state of fully erased. While many have lost files and been unsuccessful in retrieving them, for an information security…

  • Businesses Must Secure Customer Data to Ensure Holiday Season Success

    by Nathan Eddy on November 28, 2016

    The holiday season is prime time for the use of credit card skimmers in retail environments. This time of year, the number of transactions increases and the ability of the average retailer to respond to threats is limited due to the amount of activity. Furthermore, most companies are in a change freeze between Thanksgiving and Christmas, slowing the rollout of new or modified security controls. …

  • StoryCorps @ RSAC: Follow the Path

    by Jennifer Lawinski on November 23, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. How does one wind up working in cybersecurity? Turns out, there are many paths one could take. This month's podcast features Dave Martin, Technology and Innovation Leader, IT Risk and…

  • DNS Security: Defending the Domain Name System

    by Ben Rothke on November 22, 2016

    That you are reading this review, and my ability to post it are due in large part due to the Domain Name System (DNS). DNS is Wikipedia describes it is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most…

  • Camouflaging State-Sponsored Malware Attacks

    by RSAC Contributor on November 21, 2016

    By Gunter Ollmann, CSO, Vectra Networks Most organizations continue to struggle with malware-based intrusions. Despite the deployment of policies, user education, enforcement chokepoints, data inspection, and regular assessment of defenses, malware remains the primary method of breaching the corporate network. While anti-virus vendors persist in publishing exposés on the latest and most advanced…

This document was retrieved from https://www.rsaconference.com/blogs on Fri, 09 Dec 2016 21:57:04 -0500.
© 2016 EMC Corporation. All rights reserved.