Uncategorized

A Look into RSA 2019: Cultural Blending and Capability Building During the Implementation of DevSecOps

May 24, 2019 | Adeline Zhang

As an increasing mature technical system in the security domain, DevSecOps, in nature, inherits the concept of shifting security to the left during the security development lifecycle (SDL). Simply speaking, DevSecOps is capability integration, continuous learning, and cultural blending. In fact, the concept of “blending” is also reflected by the theme of the DevSecOps Day […]

Machine Learning Algorithms Power Security Threat Reasoning and Analysis

May 21, 2019 | Adeline Zhang

RSA Conference 2019, an annual infosec event that brings all cybersecurity professionals together, kicked off in San Francisco, USA on March 4, 2019. This year’s Conference took “Better” as its theme, which reflected infosec players’ visions to constantly improve their own capabilities and work out better security solutions.

Practices of China’s Internet Giants in Machine Learning

May 20, 2019 | Adeline Zhang

At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, as one of only a few Chinese speakers, started his presentation on application of statistical learning to intrusion detection in the context of massive big data with an account of challenges facing Internet giants in security data analysis, and […]

NSFOCUS Speaking at TELECOM EXCHANGE NYC 2019

May 14, 2019 | Adeline Zhang

  Telecom Exchange, one of the largest C-level networking events that provides unparalleled collaboration, education, and one-on-one engagement with the industry’s top decision-makers, is heading to NYC next week. Executives from all around the world will be meeting to discuss the complex network infrastructure ecosystems, technology and what it means for telecom. The event will […]

A Look into RSA 2019: Interpretation of the Application Security Trend — DevOps and API Security

May 14, 2019 | Adeline Zhang

As cloud computing, big data, Internet of Things (IoT), and mobile Internet evolve, application forms and requirements are going through changes. I believe that the application security trend virtually highlights technologies and design theories: technological innovations continue to focus on API concepts; the design theories of solutions, products, and services continue to move towards DevOps […]

New Words at RSA: Machine Learning Abuse, XAI, Election Security, and CISA

May 13, 2019 | Adeline Zhang

The RSA Conference is the world’s biggest IT security meetings of the highest quality. Initially as a small cryptography forum set up in 1991, this conference has developed into a meeting at which renowned security experts from all around the world are invited to discuss the future cyberspace development and global security vendors are attracted […]

Using NLP-based Machine Learning to Automate Compliance and Risk Governance

May 10, 2019 | Adeline Zhang

The Governance, Risk & Compliance track of the RSA Conference 2019 focuses on quantification of cybersecurity risks and related cases. For example, Superforecasting II: Risk Assessment Prognostication in the 21st Century by Rich Howard from Palo Alto Networks dwells upon how to evolve semi-quantitative risk assessment into more accurate quantitative risk assessment; Math is Hard: […]

A Look into RSA 2019-Automation of Threat Discovery and Response

May 7, 2019 | Adeline Zhang

The RSA Conference 2019, which is dedicated to addressing worldwide information security issues, was held in March 4–8. This year’s RSA Conference took “Better” as its theme, aimed at exploring new cybersecurity development realms in a digital epoch and finding better security vendors, products, services, and solutions. In the past few years, with the rapid […]

Information Security in the Workplace-Password Grading

May 5, 2019 | Adeline Zhang

   

A Look into RSA 2019: Finding a New Balance Between Efficiency and Security in Incident Response

May 1, 2019 | Adeline Zhang

Incident Response Is Changing The enterprise security market has seen fast incorporation of more and more cloud, Internet of Things (IoT), and mobile devices into enterprise security environments, which traditionally abound with servers, workstations, and networking and security devices. In this context, enterprises are faced with decentralized services and products from a variety of service […]