RSA Conference
RSA Conference
Blog Post
  • A recurring complaint of many executives when berating their CISO, is that they’ve spent exorbitant amounts on information security and often don’t have a lot to show for it. In Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Auerbach Publications 978-1138197893) author Bark Engel shows how these executives are at times correct. Engel has been in the information securit...

RSA Conference
RSA Conference
Blog Post
  • Timely advice about creating a worthwhile corporate cybersecurity strategy sagely starts today by realizing that establishing firewalls and relying on the IT department to monitor attacks isn’t sufficient. Reactive strategies break down over time, making proactive strategies crucial. Further, defensive strategies work only within centralized, controlled and managed-device networks – all now totter...

RSA Conference
RSA Conference
Blog Post
  • Let’s face it. Most of us have some sort of dependence on Excel and PowerPoint. They serve as our centerpiece for aggregating data and building corporate presentations. However, when it comes to cyber security, neither one should be involved. They slow down the process, leave too much leeway for data “massaging” and create inconsistencies up, down and across the organization. Yet surprisingly, at ...

RSA Conference
RSA Conference
Blog Post
  • About ten years ago, I listened to John Thompson, then the CEO of Symantec and now Chairman of the Board for Microsoft, deliver his keynote at the RSA Conference in San Francisco. While I don’t remember many details of his talk, one quote stood out. In making a comparison to cybersecurity, he said, “You don’t buy brakes to stop. You buy brakes to go fast.” After all, if you drove your car at a few...

RSA Conference
RSA Conference
Blog Post
  • It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA...

RSA Conference
RSA Conference
Blog Post
  • It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA...

RSA Conference
RSA Conference
Blog Post
  • The massive 2003 power outage that left more than 50 million Americans and Canadians in the dark may have been a harbinger of things to come. The outage served as a sort of dress rehearsal for what happens when a major chunk of the power grid is rendered useless, and the fact that it was caused by a programming error in the distributor's alarm system should still make us very nervous. Some 14 year...

RSA Conference
RSA Conference
Blog Post
  • I want to share something with you that may not be apparent based on content statistics alone—the Internet is more than just cat videos. It stores and connects much of our lives, our livelihoods, and yes, even our livestock. That, of course, means there’s important stuff on there that needs to be protected from all manner of online threats, fraud, and pranks—including cyber cow tipping. Unfortunat...

RSA Conference
RSA Conference
Blog Post
  • The venerable File Transfer Protocol (or FTP) is going away. Kind of. Not really. In April, the Debian Project announced that it was killing its support of FTP services on November 1. Despite the Debian Project’s announcement, FTP won’t likely be faced with extinction just yet. Created in 1971, FTP has been around more than four decades. During that time, it has become ubiquitous, even if largely ...

RSA Conference
RSA Conference
Blog Post
  • Visions of the future tend to include technology for good and for evil. The most frightening is when the former turns to the latter, seemingly without prompting by humans: robots gone wrong, Skynet, you name it. But more likely is the probability that good technology will be abused by humans for malicious purposes. In cybersecurity, this started with the urge to cheat at blackjack, but has now mov...

RSA Conference
RSA Conference
Blog Post
  • When I walk around in Abu Dhabi, or in any city that I’ve travelled to recently, there is always someone taking a selfie or a video to share instantly on their social media channels. According to recent statistics by the Federal Competitiveness and Statistics Authority, around 93% of UAE residents are active Facebook users and 75% use YouTube regularly. Being active on social media can be benefici...

RSA Conference
RSA Conference
Blog Post
  • Editor's Note: This blog post originally appeared on the SANS Security Awareness blog. This blog is a work in progress and will be actively updated as new information is released. It was just announced this morning (Monday, 16 October, 2017) that the globally used WPA2 Wi-Fi security protocol has been broken. This standard is the most commonly used security standard used by Wi-Fi networks around t...

RSA Conference
RSA Conference
Blog Post
  • It's no longer a secret that relying on your company's IT security team to be the sole provider of workplace cyber security is folly. Recent incidents such as the WannaCry ransomware attack and the catastrophic Equifax breach remind us that in today's cloud-dominated, always-connected, device-centric world, everyone connected to a business—from employees and management to contractors and customers...

RSA Conference
RSA Conference
Blog Post
  • 17th November, 2016 8:45PM GMT+3. The date and time may not seem significant, but it was a portent about the future of cybersecurity in the Persian Gulf. This was the time the Shamoon 2 malware waited until before launching a data destruction payload that spread through the networks of Saudi Arabia's civil aviation agency and other Gulf State organizations, wreaking havoc. The fact that it moved l...

RSA Conference
RSA Conference
Blog Post
  • It's no longer a secret that relying on your company's IT security team to be the sole provider of workplace cyber security is folly. Recent incidents such as the WannaCry ransomware attack and the catastrophic Equifax breach remind us that in today's cloud-dominated, always-connected, device-centric world, everyone connected to a business—from employees and management to contractors and customers...

RSA Conference
RSA Conference
Blog Post
  • It’s hard to ignore that machine learning has taken over much of the discourse in today’s technology circles. It wasn’t that long ago that you needed IBM’s Deep Blue to beat a human at chess. Now there are few games that a computer has not bested humans at. Whether it’s Google’s AlphaGo and Go, Elon Musk’s OpenAI and DOTA, or Libratus built by a pair of researchers to beat the best at no-limit Tex...

RSA Conference
RSA Conference
Blog Post
  • Famously, according to the New Yorker cartoon: ‘On the Internet, nobody knows you’re a dog.’ However, today in the wake of numerous breaches, it may seem like everyone may know everything about you. The reality, naturally, is somewhere in between. As we enter another National Cybersecurity Awareness month, key information – your identity, your passwords, and your access have become more important ...

RSA Conference
RSA Conference
Blog Post
  • Most of us in the world of cybersecurity spend our days trying to solve complex security problems in one form or another as managers, engineers, researchers, investors or policy makers. Yet it is the fundamental basics of digital daily life that are to blame for the massive amount of money lost by the average citizen, not to mention all the aggravation. So, appropriately, October is National Cyber...

RSA Conference
RSA Conference
Blog Post
  • October is once again upon us and with it comes the return of Major League Baseball playoffs, college football rivalry games, the return of Stranger Things to Netflix and, of course, a month of cyber security tips and best practices. As you may know, October is National Cyber Security Awareness Month (NCSAM) - an annual campaign to raise awareness about the importance of cybersecurity. NCSAM is de...

RSA Conference
RSA Conference
Blog Post
  • 17th November, 2016 8:45PM GMT+3. The date and time may not seem significant, but it was a portent about the future of cybersecurity in the Persian Gulf. This was the time the Shamoon 2 malware waited until before launching a data destruction payload that spread through the networks of Saudi Arabia's civil aviation agency and other Gulf State organizations, wreaking havoc. The fact that it moved l...

RSA Conference
RSA Conference
Blog Post
  • This month the theme is technology, and when it comes to information security, there is a whole lot of that around. From firewalls to switches, IDS to SIEM, to a lot of other hardware and software with 3 and 4-letter acronyms, technology is at the heart of information security. But how does an enterprise ensure that the huge amounts they spend are implementing good security. That is where an infor...

RSA Conference
RSA Conference
Blog Post
  • Much has been written about how Equifax could have prevented the recent breach that exposed personal information on 143 million Americans with one simple act that's supposedly on the to-do list of every corporate security practitioner: Stay up to date on patches. We've read about how the Apache Software Foundation had released a patch to address a vulnerability in its Struts web app-building softw...

RSA Conference
RSA Conference
Blog Post
  • Do we need look any further than the recent Equifax breach for compelling evidence of what a cyber security incident can do to a business? A couple of weeks ago, Equifax was just one of three credit reporting agencies Americans knew housed their financial data. Today? It is being held up as an example of the risks of housing valuable data. We've all seen the eye-popping number over and over again:...

RSA Conference
RSA Conference
Blog Post
  • Autonomous vehicles have already started making headlines in the Middle East. GCC countries such as the UAE have shown widespread commitment to sustainability and renewable energy initiatives. We saw the launch of the first Tesla showroom in Dubai during July of this year. This growth of driverless technology has resulted in the fear of malicious actors taking control of glaring flaws in smart car...

RSA Conference
RSA Conference
Blog Post
  • The Middle East is home to the world’s oldest nations – and some of the world’s oldest conflicts. And while the Great Powers, especially the U.S., Russia, and China, have dominated the “cyber war” headlines, the truth is that every country on Earth is now defending its sovereignty, and projecting power, in cyberspace. In 2004, at DEF CON in Las Vegas, Duke University Professor Peter Feaver and I d...

RSA Conference
RSA Conference
Blog Post
  • September, and Fall, signal the harvest for farmers, and for CISOs. The project seeds that were planted earlier in the year are getting implemented and showing results. This is also the time when planning starts for next year. In farming terms: what crops and seeds are needed; where do you fertilize; and which fields need rotating? For CISOs the planning and budget process often starts and stops a...

RSA Conference
RSA Conference
Blog Post
  • Every now and then, it may seem as though the explosive growth of increasingly sophisticated, novel and successful cyberattacks is overwhelming. Who can keep up and fend off the attacks? Certainly not the federal government, and certainly not most major corporations. Further undermining a strong defensive posture is the swelling shortage of cybersecurity specialists– more than 1 million globally t...

RSA Conference
RSA Conference
Blog Post
  • I’d like to submit that the heyday of User and Entity Behavior Analytics (UEBA) technology is upon us, despite many preconceived notions. As CTO of a vendor that plays in this space, that theory shouldn’t surprise you; however, if you care to read on I feel that I can make a pretty good case. To be fair, the first generation of UEBA security products delivered some immediate value, yet also left a...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.