Menu

Blogs

Showing Blog Posts: 1–10 of 1156

  • Maintaining Security When IT is on Holiday

    by Nathan Eddy on December 5, 2016

    With the holiday season fast approaching—they’re playing Jingle Bells in the department stores across the land—businesses need to be ready for the periods when IT security staff will be enjoying time with friends and family. The job of the IT pro isn’t likely to get easier anytime soon, and this is especially true during the holidays when employees are out of the office and expect to remain…

  • Getting to Know the RSAC Advisory Board: Ed Skoudis

    by Jennifer Lawinski on December 2, 2016

    Name: Ed Skoudis Title and company: Instructor and Fellow, SANS Institute; Founder, Counter Hack Number of years in the information security industry: 20 RSAC: What was your first job in the infosec industry? Skoudis: Working at Bellcore helping the Baby Bells secure their early IP networks. RSAC: What does the RSA Conference 2017 theme, “The Power of Opportunity,” mean to you? Skoudis: Information…

  • 10 Attributes of a NextGen Security Program

    by Rook Security on November 30, 2016

    By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to…

  • Secure Data Deletion

    by Ben Rothke on November 30, 2016

    The law of conservation of energy is that energy remains constant; it can be neither created or destroyed. It simply transforms from one form to another. While not a perfect analogy, data on a hard drive or other physical media is quite difficult to completely transform to the state of fully erased. While many have lost files and been unsuccessful in retrieving them, for an information security…

  • Businesses Must Secure Customer Data to Ensure Holiday Season Success

    by Nathan Eddy on November 28, 2016

    The holiday season is prime time for the use of credit card skimmers in retail environments. This time of year, the number of transactions increases and the ability of the average retailer to respond to threats is limited due to the amount of activity. Furthermore, most companies are in a change freeze between Thanksgiving and Christmas, slowing the rollout of new or modified security controls. …

  • StoryCorps @ RSAC: Follow the Path

    by Jennifer Lawinski on November 23, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. How does one wind up working in cybersecurity? Turns out, there are many paths one could take. This month's podcast features Dave Martin, Technology and Innovation Leader, IT Risk and…

  • DNS Security: Defending the Domain Name System

    by Ben Rothke on November 22, 2016

    That you are reading this review, and my ability to post it are due in large part due to the Domain Name System (DNS). DNS is Wikipedia describes it is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most…

  • Camouflaging State-Sponsored Malware Attacks

    by RSAC Contributor on November 21, 2016

    By Gunter Ollmann, CSO, Vectra Networks Most organizations continue to struggle with malware-based intrusions. Despite the deployment of policies, user education, enforcement chokepoints, data inspection, and regular assessment of defenses, malware remains the primary method of breaching the corporate network. While anti-virus vendors persist in publishing exposés on the latest and most advanced…

  • RSAC 2017 Speaker Submissions Parallel Industry Predictions and Real-World Events

    by Britta Glade on November 17, 2016

    This year has been the year of extortions and, more than ever before, conversations around cybersecurity are more mainstream with increased media coverage of everything from major enterprise hacks to dinner table discussions around the upcoming election and privacy. And with cyber-criminals collecting $209 million in just the first three months of 2016, we have seen an increase in overall consumer…

  • RSA Conference 2016 Abu Dhabi: Highlights From Day Two

    by Jennifer Lawinski on November 16, 2016

    RSA Conference 2016 Abu Dhabi was in full swing on Wednesday morning. The day kicked off with keynote addresses that touched on different facets of the cybersecurity industry. Sahir Hidayatullah, CEO of Smokescreen Technologies, began his keynote address with the tale of the U.S. Army’s ghost army, a unit that used deception tactics, a term we saw a lot of here at RSA Conference. The ghost army…

This document was retrieved from https://www.rsaconference.com/blogs on Tue, 06 Dec 2016 05:10:39 -0500.
© 2016 EMC Corporation. All rights reserved.