Despite the way political leaders like to work, the internet means commercial border are fluid and permeable. That means businesses need to be aware of privacy and security regulations in other countries as well as at home. I spoke with Dana Simberkoff, from software vendor AvePoint at this year's RSA Conference in Singapore. She is a member of the International Association of Privacy Professionals and strong believer in having robust data management processes in place in order to manage the privacy needs of people in an increasingly globalised world.
Tagged With rsa
There's a shortage of IT professionals; there's an even greater shortage of IT security professionals. Organisations are paying good money to find the right talent to protect their valuable IT assets and that's motivating broader IT professionals to either skill up or outright move into the security space. But just because you have the technical know-how doesn't mean you'll be an effective security professional. So what makes a good IT security professional? Let's find out.
High profile data breaches have pushed IT security up on the agenda of organisations. As a result, some companies have been overzealous in implementing a whole host of security solutions in the hopes of staving off attacks. But this is not an effective or efficient approach to IT security; You need to take the plunge and streamline your security product portfolio. Here's where you can start.
Australia is being hit hard by ransomware attacks and we've heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSA CTO Zulfikar Ramzan thinks it's better to just pay up. Here's why.
During last week's RSA Conference in Singapore, a panel hosted by RSA Conference Chair Dr Hugh Thompson with Tobias Feakin, the director of the International Cyber Policy Centre, RSA’s CTO Zuli Ramzan and Paul O’Rourke, the Asia-Pacific Cyber Security Leader at Ernst & Young discussed a number of interesting issues pertaining to the “Asian Opportunity for Security”.
During an exclusive Q and A with RSA's President Amit Yoran, we wanted to find out whether the infosec industry was getting better at fighting off adversaries and stemming the tide of mega-breaches and other security incidents.
It’s clear from this year’s RSA Conference in Singapore that mobility is one of the key battlefronts in the cybersecurity fight. According to RSA’s senior director of technology Kayvan Alikhani, one of the biggest steps forward has been the establishment of a hardware route of trust.
Mobile threats are a huge challenge for technology managers. With many security measures initially developed for a stationary world of desktop computers and local data centres, the rapid proliferation of consumer-focussed mobile devices caught security managers on the hop and they’ve been playing catch up ever since. We spoke to one of RSA’s mobile security specialists, Salah Machani, at this year’s RSA Conference in Singapore about these threats.
So, as about a million Australians quietly shit themselves as the Ashley Madison data breach starts to bleed data, we have the UK government talking about banning encryption. Although they have backtracked to some some degree UK Prime Minister David Cameron told his parliament the country needed to crack down on encryption in order to make it harder for terrorists to communicate.
During today’s opening keynote for the 2015 RSA Conference, delivered by RSA CEO Amit Yoran at Singapore’s Marina Bay Sands Convention Centre, the approximately 4500 delegates were told that the "old" approach to security was done. It's time to approach security from a new perspective with the old methods ineffective.
At the recent RSA Conference held in San Francisco, there was a huge focus on threat intelligence and some of the techniques being used to gain access to systems. One that grabbed our attention was the use of the Internet Wayback Machine.