Tagged With rsa

0

Despite the way political leaders like to work, the internet means commercial border are fluid and permeable. That means businesses need to be aware of privacy and security regulations in other countries as well as at home. I spoke with Dana Simberkoff, from software vendor AvePoint at this year's RSA Conference in Singapore. She is a member of the International Association of Privacy Professionals and strong believer in having robust data management processes in place in order to manage the privacy needs of people in an increasingly globalised world.

0

There's a shortage of IT professionals; there's an even greater shortage of IT security professionals. Organisations are paying good money to find the right talent to protect their valuable IT assets and that's motivating broader IT professionals to either skill up or outright move into the security space. But just because you have the technical know-how doesn't mean you'll be an effective security professional. So what makes a good IT security professional? Let's find out.

Predicting the future is near impossible -- but that doesn‘t stop us all from having a red hot go. Human beings have been predicting the future since the beginning of history and the results range from the hilarious to the downright uncanny.

One thing all future predictions have in common: they‘re rooted in our current understanding of how the world works. It‘s difficult to escape that mindset. We have no idea how technology will evolve, so our ideas are connected to the technology of today.

0

High profile data breaches have pushed IT security up on the agenda of organisations. As a result, some companies have been overzealous in implementing a whole host of security solutions in the hopes of staving off attacks. But this is not an effective or efficient approach to IT security; You need to take the plunge and streamline your security product portfolio. Here's where you can start.

0

In trying to combat the increasing complexity of networks and the sprawl of different applications for managing security, VMware is looking at virtualisation as a way of simplifying the application of encryption to the network through their new Distributed Network Encryption, or DNE, platform.

1

During last week's RSA Conference in Singapore, a panel hosted by RSA Conference Chair Dr Hugh Thompson with Tobias Feakin, the director of the International Cyber Policy Centre, RSA’s CTO Zuli Ramzan and Paul O’Rourke, the Asia-Pacific Cyber Security Leader at Ernst & Young discussed a number of interesting issues pertaining to the “Asian Opportunity for Security”.

1

It’s an interesting question. When it comes to your business’s information assets, security policies and defensive measures -- what is it that makes your CSO or CISO lose sleep?

0

Mobile threats are a huge challenge for technology managers. With many security measures initially developed for a stationary world of desktop computers and local data centres, the rapid proliferation of consumer-focussed mobile devices caught security managers on the hop and they’ve been playing catch up ever since. We spoke to one of RSA’s mobile security specialists, Salah Machani, at this year’s RSA Conference in Singapore about these threats.

5

We've been through the shareware era. We have donationware, subscription software and plain, old buy-it-in-a-box software. But the latest way to "pay" for software is by giving apps permission to access your location, camera and other data on your smartphone.