Why outsource risk management to people who don’t care?

The 2015 Cost of Cyber Crime Study by the Ponemon Institute reported that 50% of companies have implemented some sort of access governance technology. It fell 4th on the list in terms of ROI that people were getting from governance. The implementation trend is driven primarily by compliance. In this podcast recorded at RSA Conference 2016, Travis Greene, Identity Solutions Strategist at Micro Focus, discusses why is it that in the process of implementing access … More Continue reading Why outsource risk management to people who don’t care?

A rogue access point at RSA Conference? Here’s what happened

Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a password, so most data ferrying between users’ devices and the access point(s) are not encrypted. Essentially, anyone connected to an open Wi-Fi hotspot could potentially have their data intercepted by a lurking evil-doer also connected to the hotspot. These are all things that we all know, right? … More Continue reading A rogue access point at RSA Conference? Here’s what happened

Past, present and future of threat intelligence platforms

In this podcast recorded at RSA Conference 2016, John Czupak and Ryan Trost, CEO and CTO of ThreatQuotient respectively, clarify the meaning of threat intelligence and actionable intelligence. They discuss the motivation behind the creation of the Thre… Continue reading Past, present and future of threat intelligence platforms

From the 2016 RSA Conference: What Security Controls Should You Be Concerned With?

As a security professional, what themes and trends presented at the 2016 RSA Conference should have your attention as you build out security programs?

The post From the 2016 RSA Conference: What Security Controls Should You Be Concerned With? appeared first on Security Intelligence.

Continue reading From the 2016 RSA Conference: What Security Controls Should You Be Concerned With?

Cloud computing: Security and evolution

What we’ve seen in the past 15 years is cloud computing becoming increasingly popular. Many companies have focused plenty of resources in making cloud computing the most powerful platform available at the moment. In this podcast, recorded at RSA Conference 2016, Wolfgang Kandek, CTO at Qualys, talks about the evolution of the cloud computing architecture, the problems it solves and how we can secure it. He also offers advice for those that still haven’t moved … More Continue reading Cloud computing: Security and evolution

RSA Conference 2016: The infosec glass house?

A couple of years late to the party, but I finally made it to San Francisco with a real sense of excitement to attend what was described to me as the “Super Bowl of the Security Industry.” Working with the analogy, there certainly were plenty of cheerleaders waving their pompoms for companies all claiming to do threat intelligence, and of course let us not forget machine learning. The repeated visual bombardment of dashboards, presenting graphical … More Continue reading RSA Conference 2016: The infosec glass house?

Making sense of threat intelligence data in your IT environment

Threat intelligence data has been growing at an exponential rate of 39% a month. Enterprise customers are looking at around 30,000 events going into their SIEM every second. Only a small percentage have the infrastructure able to handle that amount of data. In this podcast recorded at RSA Conference 2016, Mark Seward, VP Security Solutions at Anomali, talks about some of the problems that security personnel face in classifying and keeping order around their threat … More Continue reading Making sense of threat intelligence data in your IT environment

My reflections after visiting RSA Conference 2016

RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches demonstrate the urgent need to secure enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Other vendors are taking the approach to “encrypt data everywhere.” I think we need a broad combination of a few key approaches. Increasing regulatory compliance requirements … More Continue reading My reflections after visiting RSA Conference 2016