Wednesday, March 4, 2020

RSA president addresses 'human element' of security, sale to STG in RSAC keynote

 
Security Digest
Information security news and advice from TechTarget's network |March 04, 2020
TechTarget
FEATURED STORY
RSA Security president: We're excited about sale to STG

by Rob Wright, News Director

In his RSA Conference keynote, Rohit Ghai didn't say much about his company's sale to a private equity firm, instead urging attendees to focus on the 'human element' of security.

Advertisement
NEWS
 
CrowdStrike founder: China hacking indictments are working

During his RSA Conference keynote, CrowdStrike co-founder Dmitri Alperovitch explained why the U.S. Department of Justice's indictments against Chinese hackers have been effective.

 
FBI: $144 million in ransomware payments made over 6 years
In an RSA Conference 2020 session, FBI agent Joel DeCapua revealed how much money has been paid in ransoms, what the most pervasive ransomware variants are and more.
 
Target embraces cyber war gaming to improve incident response
At an RSA Conference 2020 panel, the director of enterprise incident management at Target explained how the company is using war gaming to simulate real attacks and data breaches in order to hone its incident response plan.
 
RSA Conference panel tackles Huawei security risks

Four panelists discussed the ban on the world's largest telecommunications equipment manufacturer in relation to to supply chain risk.

 
Securiti.ai wins RSA Innovation Sandbox Contest
Securiti.ai, which offers an AI-powered 'PrivacyOps' platform, took home the title of 'Most Innovative Startup' at RSA Conference's Innovation Sandbox Contest.
 
Thoma Bravo's Sophos acquisition near completion
SearchSecurity has learned completion of the Sophos acquisition is imminent, though the endpoint security vendor says the deal has not officially closed.
EXPERT ADVICE
 
Stop business email compromise with three key approaches

Why is BEC such a popular attack? Because it works, unfortunately, tempting hackers with huge potential payouts. Learn how to keep them from lining their pockets with your assets.

 
Good cybersecurity thesis topics for a master's degree
Writing a master's thesis? A strong topic positions you for academic and professional success, while a weak one promises to make an already intensive process arduous at best.
 
Software security testing and software stress testing basics
In this excerpt from Ric Messier's book, learn why software security testing and stress testing are critical components of an enterprise infosec program.
 
Windows IIS server hardening checklist
Use this handy Windows IIS server hardening checklist on the job to ensure your IIS server is deployed safely and stays secure in use.
 
Security testing web applications and systems in the modern enterprise
Security testing web apps with little budget and poor documentation is difficult. Ric Messier discusses building a security testing lab in the DevSecOps, cloud and automation age.
 
How an island-hopping cyberattack works and how to fight back

Being part of island-hopping is no day at the beach when it comes to cyberattacks. Learn how to avoid being either a victim or an attacker's unwitting accomplice.

 
Wired vs. wireless network security: Best practices
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires.
 
Advanced cybersecurity fraud and how to fight it
Cybersecurity fraud's roots run deep, with fraudsters forever after the same thing: tricking others out of their valuable assets. Learn how to keep defenses high.
 
Use TODO comments for secure software, development to production
Security is often considered a software development burden, despite its importance. Learn app developer tricks to ensure security controls make it from development to production.
 
Privacy controls to meet CCPA compliance requirements
Existing risk management programs are a solid foundation for CCPA compliance requirements. Learn the privacy controls needed to remain CCPA-compliant and improve IT security.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: