Menu

Blogs

  • The Security Reading Room: The Best Information Security Books of 2015

    by Ben Rothke on December 23, 2015

    There were a lot of good information security books that came out in 2015, and many that were not worth reading. The following books stand out as the best, listed in no particular order: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World: Bruce Schneier could have justifiably written an angry diatribe full of vitriol against President Obama, his administration, and…

  • A ‘Golden Key’ to Unlock Encryption Is the Wrong Approach

    by RSAC Contributor on December 22, 2015

    This post in our VC-series comes from Robert R. Ackerman, Jr., the founder and managing director of Allegis Capital. It seems like an appealing strategy—give the FBI and other law enforcement agencies, as well as our spy organizations, a back door— a “golden key”—to unveil encrypted communications to help catch criminals and terrorists and protect Americans from harm. This is particularly…

  • Security in 2016: The RSAC Advisory Board's Industry Predictions

    by Jennifer Lawinski on December 21, 2015

    The security landscape is constantly evolving, and while it's hard to predict the future, the experts of the RSAC Advisory Board have rubbed their crystal balls and offer some insight into where they see the industry moving next year. What can we expect to see in 2016? Healthcare data will be more valuable to hackers, although experts disagree on how high-profile hacks will be next year. …

  • Weekend Reading: Encryption Tools and a Holiday Security Survival Guide

    by Jennifer Lawinski on December 18, 2015

    Work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. Each week we bring you the best news and analysis from the information security world, chosen by the field's best writers and editors. This week we've got two pieces on offer for your weekend reading, a guide to gifting in the era of the Internet of Things and a…

  • Why a Code Freeze Is a Cybercriminal’s Best Friend

    by Tony Bradley on December 17, 2015

    As we wind down 2015 and businesses prepare to shut down for the extended holiday break, many will also implement a code freeze. The code freeze is a normal operating procedure that occurs regularly as an application or software update nears release, or whenever there’s a crucial business milestone—like end of quarter or end of fiscal year. Unfortunately, a code freeze also means that…

  • EMV Leads to Increased Digital Risks This Holiday Shopping Season

    by Alisdair Faulkner on December 16, 2015

    The deadline for U.S. retailers and credit card processors to adopt the Europay-MasterCard-Visa (EMV) global standard chip cards passed in October, and those who have yet to adopt the technology will now be liable for any point-of-sale (POS) fraud losses. Given the high-profile retail data breaches in recent years—including Home Depot, Michael’s, Neiman Marcus and Sally Beauty—all of which were…

  • Why Threat Matters for Critical Infrastructure

    by Gib Sorebo on December 15, 2015

    As the drumbeat of cybersecurity breaches seems ever-present in the media, we’re starting to see some real attention being paid to this function in a number of verticals, and a willingness to go beyond their regulatory compliance obligations. For example, large retailers have reorganized their security teams and made significant investments in personnel and technology. Healthcare organizations, …

  • Protecting a Ghost Town: How Stay Secure When Your Staff is on Vacation

    by Tony Bradley on December 15, 2015

    The doors are locked. The lights are off. All through the office not a creature is stirring, not even a mouse. Well, one can hope at least. In a few weeks that's how most organizations will look. Business will all-but-cease and many employees will be home celebrating the holidays with family and friends. Hackers, cybercriminals, and malware, on the other hand, will be putting in extra hours to…

  • Combating Digital 'Overage' in a Goods-'Shrinkage' World

    by Chenxi Wang on December 14, 2015

    It’s that time again, when retail businesses across the country expect to see the year's highest volume of consumer transactions. Stores are decked out, discounts are advertised, and shoppers—both physical and cyber—are rolling in. A friend of mine, a manager of several retail branch stores for a national brand, told me that in brick-and-mortar retail stores, they keep in mind the concept of…

  • Weekend Reading: Malware Campaigns and Bitcoin Copycats

    by Jennifer Lawinski on December 11, 2015

    Work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. Each week we bring you the best news and analysis from the information security world, chosen by the field's best writers and editors. This week we've got two stories for you that shed light on cybercrime. Paul Wagenseil, Senior Editor, Security at Tom's…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 09 Feb 2016 00:39:43 -0500.
© 2016 EMC Corporation. All rights reserved.