Showing Blog Posts: 1–10 of 1231

  • Ben's Book of the Month: Review of "Take Back Control of Your Cybersecurity Now: Game Changing Concepts on AI and Cyber Governance Solutions for Executives"

    by Ben Rothke on March 30, 2017

    Mark Twain said that “if you don't like the weather in New England now, just wait a few minutes.” With that, one of the challenges of working in the information security field is staying current. If an information security professional were to go on sabbatical (what a thought); by the time they came back from their escape, the information security world would be a very different place. And for…

  • Q&A with RSAC 2017 Security Scholar Rachael Skillman

    by RSAC Editorial Team on March 29, 2017

    Did you know that we had more than 620 students on-site at RSA Conference 2017 in San Francisco? 60 of those students were hand-selected to participate in the RSAC Security Scholar program. RSA Conference Security Scholar connects the brightest up-and-coming cybersecurity students to leading experts, peers, and conference attendees. Its goal is to share knowledge, experience, and connections to…

  • Lessons from Managing Your Open Source

    by RSAC Contributor on March 28, 2017

    By Joshua Bressers During the RSA Conference, I hosted a Peer 2 Peer on how to manage your open source. The purpose of the session was to have a discussion about how the participants were securely managing the open source their organizations were using. It’s no secret these days that nearly every organization is using open source to solve their challenges. Everything from containers running…

  • Cybersecurity Jobs Go Begging

    by Robert Ackerman Jr. on March 27, 2017

    In an era in which we chronically hear about a profusion of new low-paying jobs, there is a challenging and diversified specialty – the cybersecurity professional– that pays well and offers good advancement potential. And yet, we can’t come close to filling the demand for these types of workers. Security pros protect critical information, which means they have an immediate impact on the…

  • Ransomware Gets More Personal Through Mobile

    by Bill Taylor-Mountford on March 24, 2017

    When ransomware took centerstage a few years ago, we failed to anticipate its magnitude and severity. 2016 was the year when ransomware dominated headlines as it exploded to become one of the biggest security wakeup calls for CXOs. That year the FBI estimated that ransomeware could be a $1 billion source of illicit income for cyber criminals, and, a survey by Osterman Research showed that 39…

  • South by South Security: Blockchain, IoT, cyber legislation and more

    by RSAC Editorial Team on March 24, 2017

    Q1 can be an interesting time for many members of our community. Kicking off a new year typically means starting new budgets, new campaigns for various products/services and visiting tradeshows across the globe to meet with prospective customers. We appreciate the time our community spends in our halls, knowing many of them also have events like HiMSS, Mobile World Congress and SXSW on their…

  • Addressing the Cybersecurity Talent Shortage

    by Antonio Garcia on March 23, 2017

    The current cybersecurity talent shortage is well-known to all industries and sectors, despite denials from the federal government. Today, companies must compete to attract and retain cybersecurity professionals who demand higher salaries and more generous benefits packages. While industries like finance and tech can afford to pay, many other sectors often cannot. These sectors often have limited…

  • Internet of Things: Monster Sized Problems

    by Lawrence Dietz on March 22, 2017

    My Peer to Peer “IoT & SCADA: Lessons Learned and Case Studies” was standing room only with a line out the door waiting to get in. We had a mix of attendees with varying degrees of technical depth. We discussed some of the previous SCADA and Internet attacks such as Stuxnet and Mirai and looked at a hypothetical company that experienced two cyber incidents. The cyber incidents were created to offer…

  • Pursuing Excellence in the Digital Security Space

    by James DeLuccia on March 16, 2017

    Pursuing excellence and making a difference in your family, business, and profession requires the layering and extending of insight. It is more than simply going for the hot certification, attending the popular conference, or echoing the pundits like Bruce Schneier. We ALL need you to build upon these ideas, not follow them indiscriminately. It is the prudent intentional quality development of…

  • You Can’t Take It with You! How to Manage Security When Personnel Depart

    by Kenneth Morrison on March 15, 2017

    Personnel departures are common, not just from layoffs and terminations, but also resignations, reorganizations, and spin-offs. How do you deal with these from a security standpoint? How do you extinguish access, protect against data theft, and manage the data left behind? The RSA Conference 2017 Peer2Peer session You Can’t Take It with You! How to Manage Security When Personnel Depart provided…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from on Thu, 30 Mar 2017 10:47:01 -0400.
© 2017 EMC Corporation. All rights reserved.