Showing Blog Posts: 1–10 of 133 tagged Data Breach

  • Taking Stock: Ranking the Next Billion-Dollar CyberSecurity Markets

    by RSAC Contributor on October 14, 2015

    This post in our VC-series comes from Venky Ganesan, managing director and cybersecurity investor of Menlo Ventures. With IT security spending estimated to crest the $75 billion annual mark before the end of 2015, there’s no shortage of emerging security sectors that will soon cross $1 billion in annual revenues. At the same time, with so many startups pursuing cybersecurity solutions, venture…

  • Insuring Cyber the Same Way as Natural Disasters

    by Rook Security on September 30, 2015

    There is no doubt that cyberinsurance is a fast-growing product with an important role in our current landscape where security breaches are happening at a breakneck pace. And many claim the market is nowhere near fully saturated...lots of companies remain unprotected. Most every Risk Manager has a disaster plan for what we typically think of as natural disasters: hurricane, fire, even polar…

  • Making The Case For “Small Data”

    by Chenxi Wang on September 17, 2015

    Big Data is a buzzword. Many organizations hitching themselves to the Big Data-wagon amass data quickly in search of unicorn-esque insight, but don’t put much thought into the process. To make matters worse, data, in its various contemporary forms, is readily available. The temptation is high– to collect simply because you can and because it may become useful at some point. We should practice the…

  • What Black Hat and the NFL Have in Common: Strategy

    by Eric Cowperthwaite on August 19, 2015

    This time of year is a merging of two of my favorite things, Hacker Summer Camp aka BSidesLV, Black Hat and DefCon, and the beginning of the football season. On the surface it might not appear that these things have a lot in common. However, a bit deeper analysis tells us that the strategies employed by your security team and your favorite football team revolve around many of the same principles…

  • How Not To Be Hacked: The Definitive Guide for Regular People

    by Ben Rothke on July 30, 2015

    The Advanced Encryption Standard (AES), also known as Rijndael, is susceptible to brute forces attacks. Mohit Arora of Freescale Semiconductor wrote in 2012 that it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. No one ever said brute force had to be quick. For those that don’t have a billion billion years, the alternative is to bypass the cryptography…

  • There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage For Cyberwar

    by Ben Rothke on June 23, 2015

    A point Richard Stiennon makes a number of times in There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage For Cyberwar; is that cyber Pearl Harbor is the wrong metaphor. He feels a more appropriate metaphor is cyber 9/11. At 135 pages, the book is a quick and enthralling read. And at the end you are left wondering if just perhaps, there has already been a cyber 9/11. …

  • Security by the Numbers and the Work Ahead

    by Fahmida Y. Rashid on June 2, 2015

    Every day, there is yet another survey or report highlighting people’s perceptions of information security and identifying issues that need attention. Most of them tend to repeat what we already know, but two stood out recently and got me thinking. Data Breach Costs The first is the 2015 Cost of Data Breach by IBM and the Ponemon Institute. The average per-record cost of lost or stolen data in the…

  • Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

    by Ben Rothke on June 1, 2015

    Any organization that has a sizeable web presence, especially if it involves e-commerce, will inevitably become a victim of some sort of Internet malfeasance. Contrary to popular management belief, knowing how to effectively deal with, respond to, and recover from such incidents is not a trivial endeavor. Nothing proved that more than the Sony breach of 2014. In Investigating Internet Crimes: An…

  • RSAC 2015 Experts on Responding to a Cyber Crisis

    by Tony Kontzer on April 23, 2015

    Security professionals are at war, a panel of corporate security executives said at the RSA Conference in San Francisco Thursday. Granted, the man leading the discussion was Mike McConnell, who, as former U.S. director of national intelligence, can be excused for using war analogies. The discussion was littered with battle references that made it clear military-style thinking is prevalent when…

  • Picking Out Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 14, 2015

    It’s easy to overlook Peer-2-Peer sessions when making your plans, which is a pity. Think about it—you will be digging into a topic you really care about in a room with like-minded peers and a facilitator. We asked each session facilitator to provide a short summary to help you decide which ones to attend this year. This post highlights seven P2P sessions (Scroll down for answers). Links to other…

This document was retrieved from on Tue, 01 Dec 2015 15:09:12 -0500.
© 2015 EMC Corporation. All rights reserved.