Showing Blog Posts: 1–10 of 1130

  • Getting to Know the RSAC Advisory Board: Wade Baker

    by Jennifer Lawinski on October 21, 2016

    Name: Wade Baker Title and company: Independent consultant and Co-Founder of the Cyentia Institute Number of years in the information security industry: About 15 years RSAC: What was your first job in the infosec industry? Baker: I was an instructor and system/network administrator at a university. They needed someone to take on infosec teaching and administrative responsibilities, and offered to…

  • StoryCorps @ RSAC: You Need to Shine Your Light

    by Jennifer Lawinski on October 20, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. How can we make sure our kids stay healthy and resiliant in our digital world? The biggest impact you can have as a parent and cyber-professional is working with kids to teach them about…

  • The Customer Threat

    by Wendy Nather on October 17, 2016

    For Cyber Security Awareness Month, we’re taking a closer look at cybercrime, and what organizations can do about it. To address cybercrime, you need both prevention and detection. That’s an obvious-sounding platitude, and it’s not as helpful as it could be, despite it being true. The biggest problem when it comes to detection is that skilled attackers will look exactly like authorized users. …

  • Getting to Know the RSAC Advisory Board: Wendy Nather

    by Jennifer Lawinski on October 14, 2016

    Name: Wendy Nather Title and company: Research Director, Retail Cyber Intelligence Sharing Center Number of years in the information security industry: 20 RSAC: What was your first job in the infosec industry? Nather: Director of IT Security for the EMEA region of the investment banking division of Swiss Bank Corporation RSAC: What does the RSA Conference 2017 theme, "The Power of Opportunity,"…

  • Information Security Policies, Procedures, and Standards: A Practitioner's Reference

    by Ben Rothke on October 13, 2016

    Security policies are like fiber (the kind you eat, not the telco type). Everyone agrees they are important, but often don’t want to deal with it. Most organizations eventually realize there comes a time that they are forced to tame the beast known as information security policies. They are often forced into this when it they get requests for a 3rd-party audit, PCI DSS compliance, visit from the…

  • We Have Entered the New Cyber Reality, But Are We Ready?

    by Chenxi Wang on October 12, 2016

    During the U.S. presidential debate on September 26, the moderator asked the two candidates to address the following topic: Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it? The very fact that this topic has moved beyond IT whiteboards and corporate boardrooms and into the national Situation Room indicates that we…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

  • RSA Conference: Our Most Popular Posts from September 2016

    by Jennifer Lawinski on October 5, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of September this year? Top Blog Posts 1. Why Study C…

  • Let’s Put “The App” Back in AppSec

    by WhiteHat Security on October 5, 2016

    By Setu Kulkarni, Vice President of Product Management, WhiteHat Security The shift to software solutions delivered in the cloud continues to fuel the now “digital” economy. With this shifting landscape, application security has risen to the top of most organizations’ concern list, and for good reason: applications accessed over the web are very easy targets for cyber attackers. Your approach to…

This document was retrieved from on Fri, 21 Oct 2016 07:18:46 -0400.
© 2016 EMC Corporation. All rights reserved.