Blogs

Showing Blog Posts: 11–20 of 107 tagged Data Breach

  • Keeping Private Data Private: Tips and Tricks

    by Joshua Marpet on July 4, 2014

    Companies produce data. Some of it is public data, some private data. The classification of data into public and private is important, but right now, the means to keep data private is incredibly important as well. Keeping data private is a process. It starts with examining the use cases for the data. Is this piece of information going to be used every day? Or does it just need to be stored in…

  • Cyber Crime, Security and Digital Intelligence

    by Ben Rothke on June 30, 2014

    Cyber Crime, Security and Digital Intelligence by Mark Johnson is a high-level introductory text to information security. The books 12 chapters cover the following topics: Threats to key sectors Cyber security fundamentals Cyber-attack fundamentals Organized cyber attacks Cloud risks Web 2.0 risks Cyber security threat actors Common vulnerabilities Cyber security control frameworks Cyber security…

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

  • Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

    by Ben Rothke on May 26, 2014

    The only negative thing to say about Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is its title. A cursory look at it may lead the reader that this is a book for a script kiddie, when it is in fact a necessary read for anyone involved with payment systems. The book provides a wealth of information that is completely pragmatic and actionable. The problem is, as the…

  • Breaches: When You're Caught With Your Britches Down

    by Christopher Burgess on May 19, 2014

    Head over to the search engine of your choice, put in the keywords "data breach," and take a look at the screen. The very first thing you'll encounter is the new cottage industry that has evolved around rectifying the residual fallout that accompanies many breach events. You'll discover that there is no shortage of paid ads offering various solutions. Then you'll see the multitudes of vendors…

  • Modern Challenges of Mobile Forensics

    by John Linkous on May 14, 2014

    As the world of technology continues to move toward mobile devices, these devices are becoming rich targets for malware, bad actors, and even government agencies seeking to increase the scope of their surveillance capability. Of course, there's a lot that an enterprise can do to secure their mobile devices properly. However, the reality of today's threat landscape is such that that organizations…

  • Greatly Reduce Data Theft by Knowing the Who and Where of Your Data

    by Christopher Burgess on May 9, 2014

    The universal constant of every business, regardless of size or industry, is that it has important data, and that data may be the target for theft. What should be the second constant is knowledge of where the data is located. Once you know its location, you can sort out who has access. This sounds simple, yet so many companies are unable to say with certainty where their data is, who has access…

  • BYOD Is Alive and Growing in APAC

    by Christopher Burgess on May 5, 2014

    Bring your own device (BYOD) adoption in APAC is alive and well, and is expected to increase by more than 20 percent from 2014 to 2020, according to a study by Grand View Research. Two driving factors for this growth are reduced hardware costs and the maturation of cloud-based solutions, and the devices of choice are smartphones and tablets. What's in it for the businesses? A report from…

  • When Intellectual Property Goes Out the Front Door

    by Christopher Burgess on May 1, 2014

    According to a 2012 survey by the Japanese Ministry of Economy, Trade, and Industry (METI) referenced in The Asahi Shimbun, it was revealed that of the 3,000 Japanese companies polled, 13.5 percent have had their intellectual property (IP) leaked or have suspected a leak over the past five years. The Asahi Shimbun goes on to describe how IP is being stolen by a variety of entities, both foreign and…

  • Windows XP: The COBOL of the 21st Century

    by Joshua Marpet on April 21, 2014

    What happened when Windows XP went into end of life (EOL)? That fateful day happened on April 8, 2014. It doesn't mean that WinXP computers will suddenly stop working. It doesn't mean that the world of WinXP computing will end. To be honest, it probably doesn't even mean that WinXP-based programming will end. So what does it actually mean? New drivers won't be developed. It will get increasingly…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 01 Nov 2014 10:01:42 -0400.
© 2014 EMC Corporation. All rights reserved.