Blogs

  • New Report Shows Retailers Slow to Make Use of Social Commerce Big Data

    by Robert Moskowitz on June 5, 2014

    The third annual Social Commerce IQ (SCIQ) report, based on survey results from 872 retailers regarding data from seven popular social platforms, shows that retailers have been slow to take advantage of the opportunities available to them in data from online consumers on brand awareness, traffic, and social CRM. The new report, prepared by social discovery pioneer 8thBridge, reflects the volume of…

  • Right-Sizing Information Risk for the Global Enterprise

    by John Linkous on June 4, 2014

    For many years, the most commonly accepted standard model of risk has been the verbatim formula (or a close variation of it): risk = [likelihood of threat] * [consequence of threat] * [asset value] This model is the foundation of most risk management activities; it was a topic in several RSA Conference 2014 sessions, including Malcolm Harkins' "Business Control and Velocity: Balance Security, …

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

  • Customer Data Cleanup in Aisle Four: Are You Helping YOUR Clients?

    by David Wallace on May 30, 2014

    If your personal data and credit account details were stolen recently, your choice is basically to get another card or start paying for things with cash. For companies, retaining clients means winning back trust. While banks, store chains, and credit card processors point fingers at each other, shoppers can only mop up the leak and hope there's no long-term harm to credit scores or financing. …

  • Innovation Sandbox at RSA Conference APJ 2014

    by Linda Gray on May 29, 2014

    Innovation Sandbox, a program launched at RSA® Conference 6 years ago, is an “incubator of innovation” that promotes new technology and new ways of thinking. This exciting program merges the world of technological innovation with established leaders in the industry and supports and targets cybersecurity startups and early-stage companies. Building on the success of the program at the US…

  • Losing Faith with Retail POS?

    by Christopher Burgess on May 28, 2014

    The technology section of every newspaper, magazine or online entity lately is describing how point of sale (POS), and the use of your credit cards is a bit like playing Russian roulette with the retail POS terminals — are they or are they not compromised? The recent batch of retail breaches of payment card industry (PCI) data began with Target, then Neiman Marcus, Michaels, and a bevy of…

  • Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

    by Ben Rothke on May 26, 2014

    The only negative thing to say about Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is its title. A cursory look at it may lead the reader that this is a book for a script kiddie, when it is in fact a necessary read for anyone involved with payment systems. The book provides a wealth of information that is completely pragmatic and actionable. The problem is, as the…

  • Mobile Devices, Cyber Attacks, and the New Frontier

    by John Linkous on May 26, 2014

    As the unrelenting game of attackers versus defenders continues in the world of information security, mobile cyber attacks are becoming a more desirable attack vector for hackers, criminal organizations, and nation-states to gain access to data. The past few years have started to see long-term, concerted campaigns targeting mobile devices, most notably the Red October malware that targeted…

  • National and International Security Awareness Initiatives

    by Christopher Burgess on May 23, 2014

    Programs such as National Cyber Security Awareness Month (US) and Safer Internet Day (global) are designed to heighten international awareness for both companies and consumers. But who benefits? Individuals? Small and medium businesses (SMBs)? Enterprises? Individual Awareness Over the course of the past five years, National Cyber Security Awareness Month (NCSAM) has evolved from providing…

  • Why Stories Reveal If You Can Trust the Security of Your Supply Chain

    by Michael Santarcangelo on May 21, 2014

    It's a conundrum. When working with the supply chain, secrecy is important. Sometimes, it's the difference between success and failure. However, when acquiring technology or working with partners, that secrecy could spell certain doom in the event of a problem. Worse, it often prevents the visibility into the process to conduct an appropriate evaluation. Can you trust the security across your…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 23 Oct 2014 17:57:40 -0400.
© 2014 EMC Corporation. All rights reserved.