Year in Review: Your Favorite Stories of 2015


Posted on by Jennifer Lawinski

The end of the year is always a time for reflection, and as we start thinking about our New Year's Resolutions, it can be helpful to take a look at what we learned the year before--or at least in what we liked reading. Last year you were interested in a wide variety of topics including books on cybersecurity, methods of attack and learning more about the RSA Conference. 

What were your favorite stories in 2015? Here's the list: 

The Best Information Security Book of 2014 and Some Other Excellent Ones: Our book reviewer Ben Rothke took a look at the best books published in 2014, with a book about managing risk coming out on top. 

Get Ready for RSA Conference 2016 Call for Speakers: In 2015, you were interested in learning how to become a speaker at RSA Conference 2016. Our Senior Content Manager Britta Glade gave the lowdown on how to put together an application that was sure to get noticed. 

Is Defense In Depth Dead?: Today, a castle-like defense-in-depth architecture just doesn’t work anymore. It’s time for IT professionals to recognize that doubling down on that failed security philosophy is a waste of time and resources. What to do instead? 

Network Intrusion: Methods of Attack: Detecting an intrusion depends on the defenders having a clear understanding of how attacks work. 

HITRUST or High Risk? The Health Information Trust Alliance’s Common Security Framework: Author Gib Sorebo discusses why any cybersecurity framework, when used for compliance purposes, inevitably forces organizations into a checkbox mentality that discourages innovation, causes wasteful spending, and increases cybersecurity risk.

How We Foiled Ransomware and Got the Files Back: Derek Soeder, a senior threat researcher at Cylance, discussed how he and his team reverse engineered ransomware to recover the password used to encrypt client files.

Designing and Building a Security Operations Center: In "Designing and Building a Security Operations Center," author David Nathans provides the basics on how that can be done.

Welcome to the Securosis Guide to the RSA Conference: We let Securosis put together a little guide to the RSA Conference, and nobody got fired. 

Contributors
Jennifer Lawinski

Director of Social Media & Community, Arculus

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs