Blogs

Showing Blog Posts: 1–10 of 80 tagged Hackers and Threats

  • Privacy in the Age of Ubiquitous Computer Vision

    by Joshua Marpet on April 17, 2014

    With Google Glass, cell phone cameras, hidden cameras, and ever cheaper surveillance cameras, can there truly be user privacy? With Google Glass and facial recognition apps, tagging people can happen at full walking speed, without a pause or possibility of the action being recognized. Is there any parallel in other realms? At one point, a car with an expired registration would only get exposed…

  • New Threats, New Requirements: Time to Update Your Information Security Policies

    by John Linkous on April 15, 2014

    In the rapid scale of technology time, it's safe to say that we're no longer living in the world of your father's Internet. Of course, this has ramifications for Internet security: The rapid adoption of the mobile device as the primary interface for many users, the mass-scale outsourcing of infrastructure, services, and data to cloud providers, and the now-ubiquitous "Internet of Things" that…

  • Unmasking the Social Engineer: The Human Element of Security

    by Ben Rothke on April 13, 2014

    In his first book, Social Engineering: The Art of Human Hacking, author Christopher Hadnagy wrote the definitive book on social engineering. In it, he detailed the entire lifecycle of social engineering and pretty much everything you needed to know on the topic. In his just released follow-up Unmasking the Social Engineer: The Human Element of Security, he takes social engineering up a few levels. …

  • How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    by Ben Rothke on April 2, 2014

    When it comes to documenting the history of cryptography, David Kahn is singularly one of the finest, if not the finest writers in that domain. For anyone with an interest in the topic, Kahn’s works are read in detail and anticipated. Kahn’s first book was written almost 50 years ago: The Codebreakers – The Story of Secret Writing; which was a comprehensive overview on the history of…

  • Secure Global Open Source Calling and Message Tools

    by David Wallace on March 25, 2014

    Risk versus reward? Open source versus packaged? Security or flexibility? All of these decisions matter deeply when considering personal safety for international travelers. Because today's cell phones send a signal beacon that identifies your location, network, and movement, companies are turning to more secure open source applications to protect phone conversations and hide the email trail in…

  • Threat Modeling: Designing for Security

    by Ben Rothke on March 3, 2014

    When it comes to measuring and communicating threats, the most ineffective example in recent memory was the Homeland Security Advisory System; which was a color-coded terrorism threat advisory scale. The system was rushed into use and its output of colors was not clear. What was the difference between levels such as high, guarded and elevated? From a threat perspective, which color was more severe -…

  • Cyber Attacks, as Real as They Get

    by John Linkous on January 30, 2014

    Once again, the fundamental nature of the Internet is changing. Moving far beyond the original scope of the Internet, in the early 1990s, the World Wide Web dramatically changed its purpose. We now find ourselves on the cusp of yet another dramatic change, as the Internet of computers gives way to an Internet of things. Unfortunately, that concept also means that this relatively new phase of the…

  • 4 Ways Social Network Engagement Can Derail a Company

    by Christopher Burgess on January 16, 2014

    Social network engagement is mainstream. Rare is the company who does not have a presence on a social network, with engagement including customer education and support, product launch, personnel recruitment, and competitive intelligence. Yet we continue to see occasions where improper employee use of technology can result in loss of intellectual property, inappropriate use of a social network for…

  • Digital Archaeology: The Art and Science of Digital Forensics

    by Ben Rothke on December 23, 2013

    The book Digital Archaeology: The Art and Science of Digital Forensics starts as yet another text on the topic of digital forensics. But by the time you get to chapter 3, you can truly appreciate how much knowledge author Michael Graves imparts. Archaeology is defined as the study of human activity in the past, primarily through the recovery and analysis of the material culture and environmental…

  • Engineering Safe and Secure Software Systems

    by Ben Rothke on December 9, 2013

    At the beginning of chapter 3 of Engineering Safe and Secure Software Systems, author Warren Axelrod (full disclosure: Warren is a friend of mine) quotes two experts who observe that “software engineering is still an oxymoron” and “software engineering, as originally envisioned, does not yet exist”. With such a stipulation it would seem there is little value in writing (and reading) such a book. …

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 19 Apr 2014 02:52:42 -0400.
© 2014 EMC Corporation. All rights reserved.