Menu

Blogs

Showing Blog Posts: 1–10 of 174 tagged Enterprise Defense

  • Peers Discuss Building Security Data Science Capability

    by RSAC Contributor on June 23, 2016

    By Clay Carter, Security Architect Leader, GE Digital Security data science is an emerging space and it was clear from our RSA Conference Peer2Peer session, Building Security Data Science Capability, that many companies are still just starting to explore how they can build their security data science capability. The group was hesitant at first to contribute, but we were fortunate to have a few…

  • Banks Need to Rethink Cybersecurity After Recent Heists Through SWIFT

    by Caitlin Moriarity on June 17, 2016

    Cyberheists are on the rise. But how are hackers getting into financial institutions with some of the best security on the planet? Through a third party, it turns out. A number of major international cyberheists have been connected to the interbank SWIFT messaging system. Tien Phong Commercial Joint Stock Bank, based in Hanoi, Vietnam, said in a May 15 statement that it had recently foiled an…

  • Plan, Pray, or Pay: What to Do After a Ransomware Attack

    by Ryan Berg on June 14, 2016

    If you’re not planning, then you’re praying. And praying doesn’t lower your odds of having to pay when ransomware hits. In the immediate aftermath of a ransomware attack—once you get past the initial confusion and shock—you’re likely to find the limited options available to you were determined by choices you made (or didn’t make) weeks and months ago. Yes, there are things you can do to try to…

  • RSA Conference APJ 2016: Catching Up with Todd Inskeep

    by Jennifer Lawinski on June 10, 2016

    As RSA Conference Asia Pacific & Japan draws near, we sat down with RSA Conference Advisory Board member Todd Inskeep, Principal, Commercial Consulting, Booz Allen Hamilton, to talk about the cybersecurity landscape in Asia, and why RSA Conference APJ is more relevant now for attendees than ever before. RSA Conference: What’s unique about the APJ cybersecurity landscape? Inskeep: APJ cybersecurity…

  • iOS Attacks: A Rapidly Evolving Threat Landscape

    by Yair Amit on June 9, 2016

    Early in the adoption of enterprise mobility, iOS was considered the “better” choice. A more stable and consistent operation system was preferable for developing custom apps, and Apple’s iOS operating system was believed to be inherently more secure than Google’s Android due to the controlled app store ecosystem and better app sandboxing mechanisms. Fast forward to today and we see that…

  • RSA Conference Greatest Hits: May 2016

    by Jennifer Lawinski on June 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of May this year? Top Blog Posts 1. Executive Hotel…

  • Big Data Is a Big Cybersecurity Problem for Banks

    by Caitlin Moriarity on June 1, 2016

    How many financial service companies are vulnerable to a data breach? Way too many, according to a new report. The report, put together by data security company Vormetric and issued in partnership with analyst firm 451 Research, shows that a whopping 90 percent of the IT security professionals surveyed in the financial services industry believe that their companies are vulnerable to a possible…

  • SHA-1 Anyone? Let's Hash It Out...

    by RSAC Contributor on May 26, 2016

    By Errol Lloyd, Principal / Technical Lead, Data Protection Engineering, Fidelity Technology Group The Peer2Peer discussion in SHA-1 Anyone? Let's Hash It Out... centered on the web's transition away from the SHA-1 hashing algorithm, used as a digital signature within digital certificates. To kick-off the session, I asked if anyone heard the SHA-1 news during the Cryptographers' Panel earlier that…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • Corporate Ransomware Attacks and What to Expect Next

    by Liviu Arsene on May 20, 2016

    Organizations have been plagued by sophisticated malware attacks in the past year, showing that cybercriminals have shifted their attention to more profitable targets and that organizations might be more prone to malware than previously believed. Oddly enough, only 38 percent of organizations currently have a strategy to deal with destructive malware, as compared to 43 percent in 2015, according…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 27 Jun 2016 03:37:07 -0400.
© 2016 EMC Corporation. All rights reserved.