Blogs

Showing Blog Posts: 1–10 of 101 tagged Data Breach

  • Data Protects Patient Privacy

    by Christopher Burgess on August 26, 2014

    Who wants his or her medical information shared beyond the healthcare professionals who need to know? It’s common sense that when it comes to medical privacy, no one wants to share his information. For the recent 2014 EMC Privacy Index,respondents from different countries were asked to rate their willingness to trade privacy for convenience on a scale from 0 to 100 (100 being the most willing and 0…

  • Risks of Not Fixing the Heartbleed Flaw

    by Fahmida Y. Rashid on August 22, 2014

    By now you’ve seen reports about the data breach at Community Health Systems where attackers stole non-medical records for 4.5 million patients, and how attackers targeted the Heartbleed flaw to get on the network. This should be a warning to IT admins: Did you fully address the bug in your own networks? "Unless fully remediated, Heartbleed leaves open doors for attackers to extract data, including…

  • The Business of Security

    by Christopher Burgess on August 6, 2014

    Some of the most affable salespersons any of us have ever encountered are in the business of selling security. The business of security takes on many personas: technology, intelligence, awareness, knowledge, automation, hardware, software, legal, identity, BYOD, privacy, insider or outsider, risk and risk tolerance, and identity. At the recent RSA Conference 2014, many presentations touched one…

  • When Culture and Security Collide

    by Alex Bender on July 7, 2014

    I talked about Security Protocols before it was cool: What happens when culture and security collide? On March 10, 2014, attendees of the music, film and interactive conference and festival South by Southwest (SXSW) crammed into two overflowing rooms for what many would later claim to be the most talked about event of the show. Former NSA contractor Edward Snowden addressed the SXSW audience via…

  • Keeping Private Data Private: Tips and Tricks

    by Joshua Marpet on July 4, 2014

    Companies produce data. Some of it is public data, some private data. The classification of data into public and private is important, but right now, the means to keep data private is incredibly important as well. Keeping data private is a process. It starts with examining the use cases for the data. Is this piece of information going to be used every day? Or does it just need to be stored in…

  • Cyber Crime, Security and Digital Intelligence

    by Ben Rothke on June 30, 2014

    Cyber Crime, Security and Digital Intelligence by Mark Johnson is a high-level introductory text to information security. The books 12 chapters cover the following topics: Threats to key sectors Cyber security fundamentals Cyber-attack fundamentals Organized cyber attacks Cloud risks Web 2.0 risks Cyber security threat actors Common vulnerabilities Cyber security control frameworks Cyber security…

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

  • Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

    by Ben Rothke on May 26, 2014

    The only negative thing to say about Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is its title. A cursory look at it may lead the reader that this is a book for a script kiddie, when it is in fact a necessary read for anyone involved with payment systems. The book provides a wealth of information that is completely pragmatic and actionable. The problem is, as the…

  • Breaches: When You're Caught With Your Britches Down

    by Christopher Burgess on May 19, 2014

    Head over to the search engine of your choice, put in the keywords "data breach," and take a look at the screen. The very first thing you'll encounter is the new cottage industry that has evolved around rectifying the residual fallout that accompanies many breach events. You'll discover that there is no shortage of paid ads offering various solutions. Then you'll see the multitudes of vendors…

  • Modern Challenges of Mobile Forensics

    by John Linkous on May 14, 2014

    As the world of technology continues to move toward mobile devices, these devices are becoming rich targets for malware, bad actors, and even government agencies seeking to increase the scope of their surveillance capability. Of course, there's a lot that an enterprise can do to secure their mobile devices properly. However, the reality of today's threat landscape is such that that organizations…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 02 Sep 2014 00:21:02 -0400.
© 2014 EMC Corporation. All rights reserved.