Menu

Blogs

  • Why a Code Freeze Is a Cybercriminal’s Best Friend

    by Tony Bradley on December 17, 2015

    As we wind down 2015 and businesses prepare to shut down for the extended holiday break, many will also implement a code freeze. The code freeze is a normal operating procedure that occurs regularly as an application or software update nears release, or whenever there’s a crucial business milestone—like end of quarter or end of fiscal year. Unfortunately, a code freeze also means that…

  • EMV Leads to Increased Digital Risks This Holiday Shopping Season

    by Alisdair Faulkner on December 16, 2015

    The deadline for U.S. retailers and credit card processors to adopt the Europay-MasterCard-Visa (EMV) global standard chip cards passed in October, and those who have yet to adopt the technology will now be liable for any point-of-sale (POS) fraud losses. Given the high-profile retail data breaches in recent years—including Home Depot, Michael’s, Neiman Marcus and Sally Beauty—all of which were…

  • Protecting a Ghost Town: How Stay Secure When Your Staff is on Vacation

    by Tony Bradley on December 15, 2015

    The doors are locked. The lights are off. All through the office not a creature is stirring, not even a mouse. Well, one can hope at least. In a few weeks that's how most organizations will look. Business will all-but-cease and many employees will be home celebrating the holidays with family and friends. Hackers, cybercriminals, and malware, on the other hand, will be putting in extra hours to…

  • Why Threat Matters for Critical Infrastructure

    by Gib Sorebo on December 15, 2015

    As the drumbeat of cybersecurity breaches seems ever-present in the media, we’re starting to see some real attention being paid to this function in a number of verticals, and a willingness to go beyond their regulatory compliance obligations. For example, large retailers have reorganized their security teams and made significant investments in personnel and technology. Healthcare organizations, …

  • Combating Digital 'Overage' in a Goods-'Shrinkage' World

    by Chenxi Wang on December 14, 2015

    It’s that time again, when retail businesses across the country expect to see the year's highest volume of consumer transactions. Stores are decked out, discounts are advertised, and shoppers—both physical and cyber—are rolling in. A friend of mine, a manager of several retail branch stores for a national brand, told me that in brick-and-mortar retail stores, they keep in mind the concept of…

  • Weekend Reading: Malware Campaigns and Bitcoin Copycats

    by Jennifer Lawinski on December 11, 2015

    Work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. Each week we bring you the best news and analysis from the information security world, chosen by the field's best writers and editors. This week we've got two stories for you that shed light on cybercrime. Paul Wagenseil, Senior Editor, Security at Tom's…

  • How to Enjoy the Holidays in Peace (While Keeping the Network Secure)

    by Tony Bradley on December 10, 2015

    I’m not sure why we even bother showing up to work in the month of December. The first week is spent coming down off of the Thanksgiving-gluttony food coma and frantically shopping online during work hours to find holiday gift bargains. We show up for the next two weeks because of a mandatory requirement to be physically present (even though you’ve already mentally checked out) and you’re just…

  • Startup Innovation Is the Future of Information Security

    by Jennifer Lawinski on December 9, 2015

    Innovation is no stranger to information security. There is a new security-focused startup coming out of stealth every few weeks. There are lots of infosec challenges, and startups are poised to tackle some of them. There are plenty of failures in information security—whether we are looking at companies slapping new marketing labels on ineffective security solutions, data breaches, or serious…

  • Sometimes, You Need to Call the Professionals

    by Rook Security on December 8, 2015

    Implementing a strong cybersecurity program requires IT security personnel that most companies don't have on staff. The reasons are many, including lack of funds and a lack of awareness of security needs. It's also tough to find qualified IT security professionals. It's a difficult job that involves working long hours, sometimes on holidays and weekends. A security operations center (SOC) analyst…

  • Getting Ready for the Holiday Hacking Season

    by Wendy Nather on December 7, 2015

    Here at the Retail Cyber Intelligence Sharing Center (R-CISC), we're bracing ourselves for one of the busiest times of year — not just for retailers, but for criminals. Of course, not all retailers see huge increases in sales volume right now (when's the last time you got a tire as a present?), but for many, this is a critical period. During peak shopping windows, availability is everything. If a…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 30 Apr 2016 22:20:24 -0400.
© 2016 EMC Corporation. All rights reserved.