Quantcast
Channel: RSA Conference Blog
Browsing latest articles
Browse All 782 View Live

Infrastructure Cybersecurity is Wanting

Just over six months ago, President Trump signed into law the Cybersecurity and Infrastructure Security Agency Act (CISA), created to better protect the nation’s critical infrastructure from physical...

View Article



Achieving Warp Speed: Making Sure Your Security Infrastructure is Up to Snuff...

When James Kirk found his beloved starship Enterprise unresponsive at a moment in which he and his crew faced seemingly hopeless odds, he would press the communication button on his captain's chair...

View Article

A Privacy-Driven Security Culture

It’s hard to go a day without seeing news of a data breach affecting thousands (to even millions of people). What additional skill sets can cybersecurity pros arm themselves with to tackle the new...

View Article

The CISO Speaks: Scott Niebuhr of The Aerospace Corp. on Cyber Security...

As if hiring cyber security staff wasn't challenging enough, now this: According to a Robert Half International survey, two-thirds of IT decision-makers plan to hire full time employees in the second...

View Article

RSAC 2019 APJ Ambassador Q&A: Mihoko Matsubara

In cybersecurity, more knowledge means more protection. But let’s be honest, staying smart is a lot of work. It means going out of your way to meet experts and find credible resources. Or, you could...

View Article


Ben's Book of the Month: Review of "Practical Cloud Security: A Guide for...

It was not that long ago, that if you wanted to build a data center with a 1,000 servers and 200 terabytes of storage; it would take about a year or so of planning to get such a design into...

View Article

A.I. Powered Malware: Will Asia Pacific Be Ground Zero?

For several years in a row now, Asia Pacific has topped the list of the most malware exposure of any region in the world, and Singapore alone saw an almost 200 percent-increase of malware detections...

View Article

RSAC 2019 APJ Ambassador Q&A: My-Ngoc Nguyen

Next up, hear from RSAC APJ Ambassador, My-Ngoc Nguyen: This will be your first time speaking at RSAC APJ – what are you most looking forward to? I’m looking forward to sharing my knowledge and...

View Article


Announcing the 2020 RSA Conference Theme: Human Element

These are evolving times in cybersecurity. We’re constantly inundated with new strategies and approaches meant to stem threats. New technologies like artificial intelligence and machine learning...

View Article


RSAC 2019 APJ Ambassador Q&A: Magda Chelly

And finally, hear from RSAC APJ Ambassador, Magda Chelly: This will be your second year speaking at RSAC APJ—what are you most looking forward to? Facilitating the discussions around important and...

View Article

Much energy, inspiration and deep dives into security at RSA Conference 2019 APJ

Thirteen new security measures will be rolled out later this year in the Singapore public sector to protect personal data after a spate of breaches in the Republic in the past year. These new measures...

View Article

Phishing drills critical to better cyber resilience

Phishing sent through emails is the most common form of cyber attack because it is easy to pull off. And the high level of digital connectivity in every business today, opens organisations to attacks....

View Article

Consumer surveillance good but risks lurk in the background

Increasingly many homes have installed surveillance cameras for safety reasons. In the past, footage is kept on the home owner’s hard disk for seven days after which it is deleted, new data is...

View Article


Social engineering effective in cyber threats

To protect a company’s crown jewels from a cyber attack, a security expert will have to think and act like a hacker. Sometimes, he or she must realise that the first point of attack is not digital,...

View Article

Deepfakes is an emerging threat vector

Cybersecurity faces a new emerging form of threats: deepfakes where images, video and audio can be digitally doctored to scam people and organisations. Remember the video of a seemingly impaired...

View Article


Cybersecurity industry can contribute its expertise to cyberspace peace

Estonia, a small nation in Europe, suffered the first nationwide cyberattack in 2007 when a DDoS attack crippled several key websites including those of banks, Parliament, government ministries and...

View Article

For efficiency and effectiveness, threat detection needs a structure

Security strategies can be planned in several ways. One is through threat detection where the objective is to find anomalies, analyse their threat level, and determine what mitigation actions may be...

View Article


With Proposed British Airways, Marriott Fines, That GDPR Iceberg Is Getting a...

When French regulators cited Europe's fledgling General Data Protection Act in fining Google $57 million earlier this year for playing fast and loose with consumer data in personalizing ads, experts...

View Article

RSA Conference 2019 APJ a success with thought provoking and useful topics

Content, content, content. That’s what made the recently concluded RSA Conference 2019 APJ special and successful. Thumbs up for the content checked all the right boxes: informative, thought...

View Article

Corporate Mobile Security Isn’t Cutting It

Let’s get right to the point immediately. It’s almost as if corporations have blinders on regarding some aspects of cybersecurity, including, in particular, mobile security and its vulnerable apps....

View Article

The DevSecOps Journey: Achieving Security at Speed and Scale

Before DevOps dramatically transformed the application development process, a typical application development scenario went like this: Application developers created their application, system or code...

View Article


The CISO Speaks: Tim Callahan on How Aflac Is Approaching Application...

Securing systems, data and processes at the application level is all the rage these days. With reports predicting that the market for application security products will experience a compound annual...

View Article


Ben's Book of the Month: Review of "Firewalls Don't Stop Dragons: A...

Variations on a Theme is a superb piece by Johannes Brahms. Borrowing on that, In Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies (Apress 978-1484238516), author...

View Article

Changing the Conversation—Leverage Business Priorities to Manage Cyber Risk

Organizations are increasingly required to meet evolving cybersecurity regulations and implement new technologies to protect critical assets and keep the business running—but how can they keep up? As...

View Article

Lessons of All Types Abound in Aftermath of Massive Capital One Breach

This was not your grandfather's bank data hack. Well, not that your grandfather would know what a bank data hack is, but if he did, he wouldn't have recognized the one that hit Capital One last month....

View Article

Browsing latest articles
Browse All 782 View Live




Latest Images