Showing Blog Posts: 1–10 of 1385

  • Ben's Book of the Month: Review of "The EU General Data Protection Regulation (GDPR): A Practical Guide"

    by Ben Rothke on March 16, 2018

    It was about 20 years ago that the Y2K problem had firms scrambling to fix the issue. At its core, it was a rather simple problem to fix. Firms just had to change a 2-digit year field to a 4-digit field. But the devil, as always, was in the details and firms struggled to understand how many applications they had, and where the date fields resided in their massive code base. Many Fortune 500 firms…

  • NIST Cybersecurity Framework Getting a Facelift, Looking to Make Adoption Easier

    by Tony Kontzer on March 15, 2018

    One of the biggest obstacles to securing the nation's critical infrastructure components, as well as to securing enterprise environments, is poor coordination. Whether it's the lack of a common vocabulary, a lack of agreement about best practices and recommended methodologies, or simply seeing security through different lenses, it's clear that without a common playbook from which to collaborate, …

  • Q&A Series with RSAC Ambassador Chester Wisniewski

    by RSAC Editorial Team on March 14, 2018

    In part two of this four-part series, meet RSAC Ambassador, Chester Wisniewski! Chester is Principal Research Scientist at Sophos, and a recent speaker at RSA Conference. We reached out to Chester to ask him a few questions as a past RSAC attendee, so read on for his thoughts on why to attend RSAC, where to eat, and which programs are must-attends: How many times have you attended RSAC? I can't…

  • Q&A Series with RSAC Ambassador Mark Nunnikhoven

    by RSAC Editorial Team on March 9, 2018

    As an information security professional, your work is never truly done. A new threat here. An advancing challenge there. All the more reason why you need to stay one step ahead of the cyber-curve. RSA Conference 2018 is here to help you do just that. As the world’s leading cybersecurity event, we bring together professionals from all sides of the field—CISOs to security engineers—to give you the…

  • If You Haven’t Filed Your Taxes, You May Want to Get Them Filed Today

    by RSAC Editorial Team on March 9, 2018

    In 2016, the IRS paid out nearly $239 million in “suspect tax refunds” and while the organization announced a steep decline in tax-related identity theft last year, fraud is an ongoing issue this time of year. In light of recent data breaches that made U.S. residents’ personal information more vulnerable than usual, it is likely that the number of fraudulent tax returns will increase in 2018. So, …

  • Using Machine Learning and DNS in the Cat & Mouse Game of Fighting Bot Malware

    by Yuriy Iuzifovich on March 8, 2018

    Although they’ve been on the security radar for years, Botnets have not gone away. Bots lurking on devices are trained to find valuable data like credit cards, logins, or credentials for financial transactions, and quietly exfiltrate them for monetization. Bot malware spreads randomly using software flaws or social engineering and attackers always want to maximize their ROI. Contemporary botnets…

  • The Lovable Defector and the Double-Edged Sword of Technology

    by RSAC Editorial Team on March 7, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is part three of a five-part monthly series to kick off 2018 in which we take a look at characters from the Star Wars saga and how technology, topics, and trends from the cybersecurity world compare to characters and themes from the blockbuster films. We hope you enjoy our blog series in which the Resistance, filled with…

  • Addressing Diversity at RSA Conference and in the Cybersecurity Industry

    by Sandra Toms on March 5, 2018

    We’ve been listening closely to the recent discussions surrounding the lack of female keynote speakers at RSA Conference, and we want to address it head on. We hear you. We understand. The Conference leadership team is made up of women, like myself, and we’re very much aware of the importance and value of bringing more women’s voices, perspectives and experiences to the forefront of conversations…

  • Ben's Book of the Month: Review of "Securing DevOps: Safe Services in The Cloud"

    by Ben Rothke on February 28, 2018

    Last year, one of my book of the month selections was The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations (IT Revolution Press 978-1942788003), by Gene Kim, Patrick Debois, John Willis and Jez Humble. As noted at DevOpsSec, the challenge facing DevOps teams today, however, is that incorporating security into their day-to-day work is not…

  • How Educational Institutions Are Failing to Adequately Protect Student Data

    by Tony Kontzer on February 28, 2018

    With security at the forefront of hot button issues across the country right now, one threat often gone unnoticed to students' well-being is the growing frequency with which their personal data is being compromised. Cyber criminals' increased interest in attacking education systems imperils students' financial futures and privacy, and gives parents a reason to question whether schools are up to…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from on Tue, 20 Mar 2018 05:40:01 -0400.