Blogs

  • Next-Gen Malware: Destructive Devices

    by Christopher Burgess on June 11, 2014

    The word malware (malicious or malevolent software) has permeated our lexicon, especially for those in the security world. A cyber-criminal's intent has been either to utilize your resources in their criminal endeavors (i.e., put their malware on your system and launch from within your hosted spaces) or to extract information from your entity that could be monetized quickly and effectively. At the…

  • Choose, but Choose Wisely: What Skills Does a CISO Really Need?

    by John Linkous on June 9, 2014

    The role of the CISO has shifted dramatically in the past ten years. Almost 20 years ago, in the early years of the information security officer role, the person who filled that position was focused on the very basics of security: antivirus, firewalls, and file system access control. At the time, there were no data security laws like HIPAA, no industry standards such as PCI or NERC, and no best…

  • A Tale of Two Cultures: Cool or Vigilant. Can the Security Industry Have Both?

    by Alex Bender on June 6, 2014

    We live in an age when a company’s “cool corporate culture” can actually come to influence them as a brand. Multi-billion dollar company Google offers an open, startup-like culture with an office layout that encourages spontaneous interactions. Earlier this year, the media was abuzz with the news that popular online shoe and clothing shop Zappos would transform itself from a traditional…

  • New Report Shows Retailers Slow to Make Use of Social Commerce Big Data

    by Robert Moskowitz on June 5, 2014

    The third annual Social Commerce IQ (SCIQ) report, based on survey results from 872 retailers regarding data from seven popular social platforms, shows that retailers have been slow to take advantage of the opportunities available to them in data from online consumers on brand awareness, traffic, and social CRM. The new report, prepared by social discovery pioneer 8thBridge, reflects the volume of…

  • Right-Sizing Information Risk for the Global Enterprise

    by John Linkous on June 4, 2014

    For many years, the most commonly accepted standard model of risk has been the verbatim formula (or a close variation of it): risk = [likelihood of threat] * [consequence of threat] * [asset value] This model is the foundation of most risk management activities; it was a topic in several RSA Conference 2014 sessions, including Malcolm Harkins' "Business Control and Velocity: Balance Security, …

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

  • Customer Data Cleanup in Aisle Four: Are You Helping YOUR Clients?

    by David Wallace on May 30, 2014

    If your personal data and credit account details were stolen recently, your choice is basically to get another card or start paying for things with cash. For companies, retaining clients means winning back trust. While banks, store chains, and credit card processors point fingers at each other, shoppers can only mop up the leak and hope there's no long-term harm to credit scores or financing. …

  • Innovation Sandbox at RSA Conference APJ 2014

    by Linda Gray on May 29, 2014

    Innovation Sandbox, a program launched at RSA® Conference 6 years ago, is an “incubator of innovation” that promotes new technology and new ways of thinking. This exciting program merges the world of technological innovation with established leaders in the industry and supports and targets cybersecurity startups and early-stage companies. Building on the success of the program at the US…

  • Losing Faith with Retail POS?

    by Christopher Burgess on May 28, 2014

    The technology section of every newspaper, magazine or online entity lately is describing how point of sale (POS), and the use of your credit cards is a bit like playing Russian roulette with the retail POS terminals — are they or are they not compromised? The recent batch of retail breaches of payment card industry (PCI) data began with Target, then Neiman Marcus, Michaels, and a bevy of…

  • Mobile Devices, Cyber Attacks, and the New Frontier

    by John Linkous on May 26, 2014

    As the unrelenting game of attackers versus defenders continues in the world of information security, mobile cyber attacks are becoming a more desirable attack vector for hackers, criminal organizations, and nation-states to gain access to data. The past few years have started to see long-term, concerted campaigns targeting mobile devices, most notably the Red October malware that targeted…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 25 Jul 2014 09:46:36 -0400.
© 2014 EMC Corporation. All rights reserved.