Most Recent Blogs

RSA Conference 2016: Day 1

Posted: February 29, 2016   /   By: Jon Oltsik   /   Tags: Cybersecurity, RSA Security Conference

Day 1 of the 2016 RSA Conference. Vendors are still setting up their booths in the exhibition hall but the sessions have begun in earnest. Here are a few highlights of what I’ve heard so far:

Read More

Cybersecurity Industry To-Do List for RSA Conference

Posted: February 25, 2016   /   By: Jon Oltsik   /   Tags: Cybersecurity, FIDO, RSA Security Conference, CNAP

rsa conference 2016During his keynote at last year’s RSA Security Conference (titled: Escaping Security’s Dark Ages), Amit Yoran, president of RSA, lambasted the industry as failing its customers. In a related interview with Fortune Magazine, Yoran said, “let’s do things differently; let’s think differently; let’s act differently — because what the security industry has been doing has not worked.”

Read More

All I Need to Know about Cyber Security, I Learned in an NSA Pamphlet for Securing Home Networks

Posted: April 27, 2015   /   By: Dan Conde   /   Tags: Networking, cyber security, RSA Security Conference, home network security

IAD-pamphletsDo you remember a list called All I Really Need to Know I Learned in Kindergarten? No? It’s a list of basic things that children are taught, which can guide them throughout life. It’s pretty old but was very popular in its day. Thinking about this led me to ask: Would lessons from a pamphlet for securing home networks have prevented some recent mega breaches? No way? Think again. 

Read More

Wrapping up RSA USA 2015, and Looking Forward to Interop

Posted: April 24, 2015   /   By: Dan Conde   /   Tags: Networking, RSA Security Conference

bits

I’m wrapping up my visit to the RSA USA 2015 Conference. The conference was as big as ever. There was a feeling of how to protect ourselves from breaches by being realistic: Realize that adversaries will somehow get into your system, so look for multi-layered approaches to protect yourself after a breach occurs and minimize the damage. But there was some hopefulness as well, since we are acknowledging the changes in the security landscape, and we’re adapting ourselves accordingly. So I hope we’re not fighting the last war, and we’re becoming forward-looking.

Read More

A Multitude of Mobile Security Issues

Posted: July 20, 2012   /   By: Jon Oltsik   /   Tags: Apple, Microsoft, End-User Computing, Check Point, MDM, Cisco, Information and Risk Management, McAfee, mobile, Security and Privacy, google, BYOD, android, Good Technology, Juniper Networks, Black Hat, trend micro, Symantec, Anti-malware, Interop, MobileIron, DLP, RSA Security Conference, iPad

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Read More

Posts by Topic

see all