Menu

Blogs

Showing Blog Posts: 1–10 of 1342

  • Book Review: Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

    by Ben Rothke on November 17, 2017

    A recurring complaint of many executives when berating their CISO, is that they’ve spent exorbitant amounts on information security and often don’t have a lot to show for it. In Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Auerbach Publications 978-1138197893) author Barak Engel shows how these executives are at times correct. Engel has been in the information…

  • The Best Cybersecurity Programs Put Employee Training First

    by Robert Ackerman Jr. on November 14, 2017

    Timely advice about creating a worthwhile corporate cybersecurity strategy sagely starts today by realizing that establishing firewalls and relying on the IT department to monitor attacks isn’t sufficient. Reactive strategies break down over time, making proactive strategies crucial. Further, defensive strategies work only within centralized, controlled and managed-device networks – all now…

  • Don’t Be a Spreadsheet Junkie

    by Humphrey Christian on November 8, 2017

    Let’s face it. Most of us have some sort of dependence on Excel and PowerPoint. They serve as our centerpiece for aggregating data and building corporate presentations. However, when it comes to cyber security, neither one should be involved. They slow down the process, leave too much leeway for data “massaging” and create inconsistencies up, down and across the organization. Yet surprisingly, at…

  • Just How Much Does Your CISO Mitigate Cybersecurity Risk? Perhaps Less Than You Think

    by Gib Sorebo on November 3, 2017

    About ten years ago, I listened to John Thompson, then the CEO of Symantec and now Chairman of the Board for Microsoft, deliver his keynote at the RSA Conference in San Francisco. While I don’t remember many details of his talk, one quote stood out. In making a comparison to cybersecurity, he said, “You don’t buy brakes to stop. You buy brakes to go fast.” After all, if you drove your car at a…

  • Ben's Book of the Month: Review of "From CIA to APT: An Introduction to Cyber Security"

    by Ben Rothke on October 31, 2017

    It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA…

  • The Time to Rally Around Protecting Our Critical Infrastructure is Now

    by Tony Kontzer on October 30, 2017

    The massive 2003 power outage that left more than 50 million Americans and Canadians in the dark may have been a harbinger of things to come. The outage served as a sort of dress rehearsal for what happens when a major chunk of the power grid is rendered useless, and the fact that it was caused by a programming error in the distributor's alarm system should still make us very nervous. Some 14…

  • The Internet Wants You: Consider a Career in Cybersecurity

    by Wade Baker on October 26, 2017

    I want to share something with you that may not be apparent based on content statistics alone—the Internet is more than just cat videos. It stores and connects much of our lives, our livelihoods, and yes, even our livestock. That, of course, means there’s important stuff on there that needs to be protected from all manner of online threats, fraud, and pranks—including cyber cow tipping. …

  • FTP Is Dead. Long Live FTP!

    by Greg Hoffer on October 24, 2017

    The venerable File Transfer Protocol (or FTP) is going away. Kind of. Not really. In April, the Debian Project announced that it was killing its support of FTP services on November 1. Despite the Debian Project’s announcement, FTP won’t likely be faced with extinction just yet. Created in 1971, FTP has been around more than four decades. During that time, it has become ubiquitous, even if largely…

  • Denial of Trust: The Future Security Threat

    by Wendy Nather on October 18, 2017

    Visions of the future tend to include technology for good and for evil. The most frightening is when the former turns to the latter, seemingly without prompting by humans: robots gone wrong, Skynet, you name it. But more likely is the probability that good technology will be abused by humans for malicious purposes. In cybersecurity, this started with the urge to cheat at blackjack, but has now…

  • The KRACK Attack: What to Communicate

    by Lance Spitzner on October 17, 2017

    Editor's Note: This blog post originally appeared on the SANS Security Awareness blog. This blog is a work in progress and will be actively updated as new information is released. It was announced (Monday, 16 October, 2017) that the globally used WPA2 Wi-Fi security protocol has been broken. This standard is the most commonly used security standard used by Wi-Fi networks around the world. The…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2017 Editorial Calendar or 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 20 Nov 2017 06:28:48 -0500.
© 2017 EMC Corporation. All rights reserved.