RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Middle East Malware: Threats and Trends
    The Middle East is home to the world’s oldest nations – and some of the world’s oldest conflicts. And while the Great Powers, especially the U.S., Russia, and China, have dominated the “cyber war” headlines, the truth is that every country on Earth is now defending its sovereignty, and projecting power, in cyberspace. In 2004, at DEF CON in Las Vegas, Duke University Professor Peter Feaver and I d...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Building the Right Security Budget
    September, and Fall, signal the harvest for farmers, and for CISOs. The project seeds that were planted earlier in the year are getting implemented and showing results. This is also the time when planning starts for next year. In farming terms: what crops and seeds are needed; where do you fertilize; and which fields need rotating? For CISOs the planning and budget process often starts and stops a...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Cybersecurity Automation Is Coming to the Rescue
    Every now and then, it may seem as though the explosive growth of increasingly sophisticated, novel and successful cyberattacks is overwhelming. Who can keep up and fend off the attacks? Certainly not the federal government, and certainly not most major corporations. Further undermining a strong defensive posture is the swelling shortage of cybersecurity specialists– more than 1 million globally t...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • The UEBA Evolution: You Gotta Be a Wolf to Catch Coffee
    I’d like to submit that the heyday of User and Entity Behavior Analytics (UEBA) technology is upon us, despite many preconceived notions. As CTO of a vendor that plays in this space, that theory shouldn’t surprise you; however, if you care to read on I feel that I can make a pretty good case. To be fair, the first generation of UEBA security products delivered some immediate value, yet also left a...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Cybersecurity Automation is Coming to the Rescue
    Every now and then, it may seem as though the explosive growth of increasingly sophisticated, novel and successful cyberattacks is overwhelming. Who can keep up and fend off the attacks? Certainly not the federal government, and certainly not most major corporations. Further undermining a strong defensive posture is the swelling shortage of cybersecurity specialists– more than 1 million globally t...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • The UEBA Evolution: You Gotta be a Wolf to Catch Coffee
    I’d like to submit that the heyday of User and Entity Behavior Analytics (UEBA) technology is upon us, despite many preconceived notions. As CTO of a vendor that plays in this space, that theory shouldn’t surprise you; however, if you care to read on I feel that I can make a pretty good case. To be fair, the first generation of UEBA security products delivered some immediate value, yet also left a...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • The Keys to Finding Cybersecurity Talent in a Candidates' Job Market
    There's a lot of fretting these days about the impact artificial intelligence will have on the job market. The fear is that many skills will become obsolete as machines perfect them, but there's no such worry in the cybersecurity world. Security pros are in an enviable position today, what with zero unemployment in the field and more job openings than qualified applicants. On the flip side, though...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Ben's Book of the Month: Review of "The CISO Journey"
    This month’s them is professional development. Just as personal development is a journey, so too is a person’s career part of the development process. In an aptly titled book The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development (Auerbach Publications 978-1138197398), author Gene Fredriksen takes the reader on an information security journey. Fredriksen spent deca...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Put the People Problem First: Addressing our #1 Cybersecurity Challenge
    Cybersecurity dominates our global headlines with news breaking every day about breaches, ransomware attacks, foreign espionage, election tampering and more. Information security is now a top concern for every organization regardless of size or industry, and businesses and government agencies are investing in a wide array of security technologies in response. While it is admirable to see such inve...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • State of Emergency: Government Cyber Security Efforts are Missing the Boat, or Just Plain Missing
    Getting to the bottom of just how problematic government approaches to cyber security are is like peeling away the layers of an endless onion. The more you learn, the more you realize this is a problem that's not going anywhere because it's not being tackled adequately. Starting at the highest level possible, the United Nations recently released its second annual Cyber Security Index which indicat...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • HBO Hack Takeaway: The Pluses and Minuses of Playing Hardball With Ransomware Attackers
    It's hard to stonewall hackers who are threatening to share sensitive data they've stolen about customers and employees on the dark web if they don't receive a ransom. The prospect of calling the bluff and risking the violation of customers' and employees' privacy understandably causes many companies to cave. But when the stolen data being released is unseen television shows — still an admittedly ...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • You Have to Know Plenty To Pursue a Cybersecurity Career – But Not Nearly Everything
    Ask a cybersecurity firm or a big financial services company with a huge cybersecurity staff what they’re looking for in new cybersecurity talent, and they will tick off their requirements in rapid-fire succession, barely stopping to take a breath. They want somebody with a bachelor’s degree in computer programming, computer science or computer engineering. They also want to see an academic backgr...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Announcing the RSA Conference 2018 Theme: Now Matters
    Although some of you may be recovering from our APJ event and others may be gearing up for this fall’s Abu Dhabi conference, we are already underway in our efforts to plan U.S. 2018. As many of our veteran attendees know, every year RSA Conference is built around a different theme, which highlights a significant aspect of information security. This year’s theme is “Now Matters.” There is an urgenc...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

RSA Conference
RSA Conference
Blog Post

New blog articles detected.

RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • A Conversation With NYU’s Professor Nasir Memon
    As part of RSA Conference’s dedication to importance of security education our own Cecilia Marinier spoke with Nasir Memon, Professor of Engineering and Associate Dean for Online Learning at New York University Tandon School of Engineering. Memon has been an active member of the academic world promoting the importance of information security education since the late 1990s. Throughout this conversa...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • RSAC 2017 Abu Dhabi: Trends in Call for Speakers Submissions
    RSA Conference 2017 Abu Dhabi will take place November 7 and 8 at the Emirates Palace with a great line up of speakers exploring topics that we know will be of interest to our attendees. How do we know we’ve hit the mark? It’s an extensive and iterative process with regional experts reviewing all of our speaking submissions, debating the merits of the different options with each other, weighing th...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • How to Get a Job in Cybersecurity
    Every time someone comes to me for career advice, or asks where I think they should look for their next big opportunity, I say – “Consider a career in cybersecurity.” It is a huge field with a broad spectrum of job opportunities. When I enter the term “Security Analyst” into a LinkedIn job search, for instance, I find more than 11,000 jobs worldwide. A “Security Auditing” search nets another 11,00...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Navigating the Network: How Mentors Can Help Newbies Break into Cybersecurity
    There’s an interesting paradox in the security industry. On the one hand, we are constantly being told that there is a dearth of talent in cybersecurity. Statistics like “one million open reqs” and “zero percent unemployment” get thrown around, creating the perception that security is the field to enter if you want a stable, long term career. As a result, more and more people are considering caree...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Recapping RSAC 2017 APJ
    Just like that, another fantastic RSA Conference APJ comes to a close. What a week! RSAC APJ kicked off with two new Seminars, DevOps Connect: DevSecOps Edition and the Ransomware Seminar. The seminar rooms were packed with attendees learning the latest and greatest in the respective fields. Keynotes began on Wednesday afternoon featuring industry experts from Symantec, Qualys, RSA, and more. Trac...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Operationalizing Cybersecurity
    Operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows. Just like organizations can’t achieve safety; they cannot achieve cybersecurity. Therefore, having a well-defined organizational cybersecurity strategy is essential in keeping organizational security goals in mind. Board members are becoming increasingly aware of the requirements to implement ...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • What is Shaping Asia’s State of Security?
    Walk down the streets of Jakarta or Jaipur, and you will be sure to see people browsing the latest news or streaming their favorite shows on their portable devices. This is no surprise since Asia Pacific is home to the world’s largest population of Internet users, bolstered by a strong mobile movement and a thriving millennial population. With the surge of connected devices in recent years comes a...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Cyber Butts in Cyber Seats
    One of the best-known episodes in the sitcom “Everybody Loves Raymond” concerns timeliness. Times for departure were specified as AIS, or A** In Seat, meaning that at the appointed time, you had to be seated in the car, or it left without you. You didn’t end up where you wanted, and you didn’t have a say in further decisions. The Trump Administration has made some good cyber security decisions so ...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Fight The Growing Cybersecurity Challenge in Health Care
    All industries need a sound cybersecurity strategy and incident response plan, but that is especially the case for health care given that instances of data breaches are on the rise. In its 2017 Internet Security Threat Report, Symantec noted that health care was listed second in the services industry in cyberbreaches, up 22% in 2016 over 2015. Email attacks – in the form of phishing and ransomware...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • The Hardware Hacker: Adventures in Making and Breaking Hardware
    Trying to place The Hardware Hacker: Adventures in Making and Breaking Hardware (No Starch Press 978-1593277581) into a specific category is a challenge. This superb book covers a multitude of topics, from hardware engineering, software design, Chinese manufacturing, to hardware hacking, product development, intellectual property law and more. In the book, author Andrew 'bunnie' Huang details his ...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Internal and External Forces Mean Healthcare Security Has to Adapt
    The complexity of healthcare information security grows daily. Paper records are long gone. With more than 700 security technologies to consider, millions of threat actors to detect and new attack vectors to defend against, simply working harder will not solve the problem. Healthcare is a prime target for hackers due to the vast amounts of private health information (PHI) and the pure complexity o...
RSA Conference
RSA Conference
Blog Post

New blog articles detected.

  • Privacy in Singapore: A Light, If Frequent, Touch
    In January, the Personal Data Protection Commission in Singapore will celebrate its fifth anniversary. While any number of privacy regulators have popped up since the PDPC’s establishment – from the Philippines’ to Japan’s to Ghana’s – it’s still easy to think of Singapore as a relatively young governing body. The Personal Data Protection Act didn’t even come into full effect until July 2, 2014. H...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.