Showing Blog Posts: 1–10 of 1302

  • Operationalizing Cybersecurity

    by Tom Conkle on July 27, 2017

    Operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows. Just like organizations can’t achieve safety; they cannot achieve cybersecurity. Therefore, having a well-defined organizational cybersecurity strategy is essential in keeping organizational security goals in mind. Board members are becoming increasingly aware of the requirements to implement…

  • What is Shaping Asia’s State of Security?

    by Britta Glade on July 25, 2017

    Walk down the streets of Jakarta or Jaipur, and you will be sure to see people browsing the latest news or streaming their favorite shows on their portable devices. This is no surprise since Asia Pacific is home to the world’s largest population of Internet users, bolstered by a strong mobile movement and a thriving millennial population. With the surge of connected devices in recent years comes…

  • Cyber Butts in Cyber Seats

    by Philip Reitinger on July 24, 2017

    One of the best-known episodes in the sitcom “Everybody Loves Raymond” concerns timeliness. Times for departure were specified as AIS, or A** In Seat, meaning that at the appointed time, you had to be seated in the car, or it left without you. You didn’t end up where you wanted, and you didn’t have a say in further decisions. The Trump Administration has made some good cyber security decisions so…

  • Fight The Growing Cybersecurity Challenge in Health Care

    by Amanda Gutshall on July 20, 2017

    All industries need a sound cybersecurity strategy and incident response plan, but that is especially the case for health care given that instances of data breaches are on the rise. In its 2017 Internet Security Threat Report, Symantec noted that health care was listed second in the services industry in cyberbreaches, up 22% in 2016 over 2015. Email attacks – in the form of phishing and ransomware…

  • The Hardware Hacker: Adventures in Making and Breaking Hardware

    by Ben Rothke on July 17, 2017

    Trying to place The Hardware Hacker: Adventures in Making and Breaking Hardware (No Starch Press 978-1593277581) into a specific category is a challenge. This superb book covers a multitude of topics, from hardware engineering, software design, Chinese manufacturing, to hardware hacking, product development, intellectual property law and more. In the book, author Andrew 'bunnie' Huang details his…

  • Internal and External Forces Mean Healthcare Security Has to Adapt

    by James Christiansen on July 13, 2017

    The complexity of healthcare information security grows daily. Paper records are long gone. With more than 700 security technologies to consider, millions of threat actors to detect and new attack vectors to defend against, simply working harder will not solve the problem. Healthcare is a prime target for hackers due to the vast amounts of private health information (PHI) and the pure complexity…

  • Privacy in Singapore: A Light, If Frequent, Touch

    by Sam Pfeifle on July 12, 2017

    In January, the Personal Data Protection Commission in Singapore will celebrate its fifth anniversary. While any number of privacy regulators have popped up since the PDPC’s establishment – from the Philippines’ to Japan’s to Ghana’s – it’s still easy to think of Singapore as a relatively young governing body. The Personal Data Protection Act didn’t even come into full effect until July 2, 2014. …

  • Effective Cyber Security is All About the Benjamins

    by Humphrey Christian on July 10, 2017

    Who can forget the famous Jerry Maguire quote, “Show me the money!” Fans have referenced it for decades in various contexts for obvious reasons. Money drives decisions, ideas and actions. In enterprises, almost every major decision is driven by money, a.k.a ‘value at risk,’ except when it comes to cyber risk. Attempts thus far to quantify the financial impact of cyber risk have fallen short. The…

  • Financial Services Organizations Are in Need of a Cyber Security Wake-Up Call

    by Tony Kontzer on July 7, 2017

    There's little to suggest that the money you've entrusted to the financial institutions you do business with is in jeopardy. But the data surrounding that money? That's another story. Financial services companies are braced for a period of continued and expanded cyber threats, and the really bad news is that many of them aren't prepared to withstand the onslaught. Recent surveys paint a picture…

  • Digital Smoke Jumpers: Preventing a GDPR Disaster

    by Guy Bejerano on July 5, 2017

    Smoke Jumpers are an elite element of the U.S. Forest Service. They are the men and women trained to jump out of airplanes and into the heart of a forest fire. As a fire rages across rugged terrain inaccessible to conventional equipment, Smoke Jumpers act to stall the fire’s advance. Often they will use techniques that literally “fight fire with fire.” Controlled burns are executed in an inferno’s…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from on Fri, 28 Jul 2017 11:03:36 -0400.
© 2017 EMC Corporation. All rights reserved.