All Posts (2221)

Sort by

Developing useful metrics

Developing useful metrics (RSA Conference 2017)

It is critical to measure the right things in order to make better-informed management decisions, take appropriate actions and change behaviors. But how do managers figure out what those right things are

Read more…
Views: 87
Comments: 0

Threat Modeling Demystified

Threat Modeling Demystified (RSA Conference 2017)

Most organizations require threat models. The industry has recommended threat modeling for years. What holds us back? Master security architect, author and teacher Brook Schoenfield will take participa

Read more…
Views: 204
Comments: 0

The Malware Monetization Machine

The Malware Monetization Machine (RSA Conference 2017)

A new generation of Internet startups is focused on converting malware infections into revenue. Who are these new CEOs, what can we learn from their business models? No longer in the shadows of th

Read more…
Views: 144
Comments: 0

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? (RSA Conference 2017)

Cyber-insurance is quickly becoming one of the hottest selling products on the market and an ever-increasing variety is being offered to businesses. Did you know that a security breach caus

Read more…
Views: 109
Comments: 0

Critical Hygiene for Preventing Major Breaches (RSA Conference 2017)

Microsoft's Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. Microsoft and the

Read more…
Views: 128
Comments: 0

Securing Serverless Applications in the Cloud (RSA Conference 2017)

Serverless applications offer a number of advantages, the biggest one being freedom from a number of standard operational tasks. And while you may not need to do basic ops tasks, you

Read more…
Views: 91
Comments: 0

Cloud Security: Automate or Die

Cloud Security: Automate or Die (RSA Conference)

Much has been said about DevOps and SecDevOps for security automation and integration. However, to many in the security community, this is still a buzzword. There are many practical applications of auto

Read more…
Views: 105
Comments: 0

One hour privacy for security officers

One hour privacy for security officers (RSA Conference 2017)

Information security officers will need to become involved in privacy issues to maintain relevance in the future. This session will provide the fundamentals of information privacy and buildi

Read more…
Views: 90
Comments: 0