Menu

Blogs

Showing Blog Posts: 1–10 of 138 tagged Hackers and Threats

  • Cybercrime and Threats Are Growing in 2016

    by RSAC Contributor on January 21, 2016

    This post in our VC-series comes from Alberto Yépez and Don Dixon, managing directors of Trident Capital Cybersecurity. It’s a new year, and we are poised again for another round of malicious, often successful cyberattacks, many of which will draw upon ever more sophisticated technology. And some of which will be surprisingly deceptive. Take, for example, so-called “onion-layered” security…

  • Encryption Rules Only Apply to Those Who Follow Them

    by Tony Bradley on January 18, 2016

    The world can be a dangerous place, and nations around the world must be vigilant to identify and prevent attacks from would-be terrorists. In the wake of recent terrorist attacks in Paris and in San Bernardino, Calif., there has been increased debate over the need for intelligence agencies to have some sort of back-door access to enable monitoring of encrypted data and communications. It’s an…

  • Weekend Reading: Microsoft Silverlight and the Internet of Things

    by Jennifer Lawinski on January 15, 2016

    We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the cybersecurity world, chosen by the field's best writers and editors. This week we take a look at Microsoft Silverlight, the Internet of Things and whether security metrics are actually doing you any…

  • Year in Review: Your Favorite Stories of 2015

    by Jennifer Lawinski on December 30, 2015

    The end of the year is always a time for reflection, and as we start thinking about our New Year's Resolutions, it can be helpful to take a look at what we learned the year before--or at least in what we liked reading. Last year you were intersted in a wide variety of topics including books on cybersecurity, methods of attack and learning more about the RSA Conference. What were your favorite…

  • Vulnerabilities for OS X and iOS Take the Spotlight in 2015

    by RSAC Contributor on December 29, 2015

    This post comes from Liviu Arsene, security analyst at Bitdefender. The common belief that Apple’s OS X and iOS are not as prone to vulnerabilities and attacks as other popular operating systems has been put to the test in 2015. As OS X and iOS adoption increases in the enterprise segment—partly due to a new generation of “millennial” managers—attackers will likely target the two platforms more. …

  • Security in 2016: The RSAC Advisory Board's Industry Predictions

    by Jennifer Lawinski on December 21, 2015

    The security landscape is constantly evolving, and while it's hard to predict the future, the experts of the RSAC Advisory Board have rubbed their crystal balls and offer some insight into where they see the industry moving next year. What can we expect to see in 2016? Healthcare data will be more valuable to hackers, although experts disagree on how high-profile hacks will be next year. …

  • Why Threat Matters for Critical Infrastructure

    by Gib Sorebo on December 15, 2015

    As the drumbeat of cybersecurity breaches seems ever-present in the media, we’re starting to see some real attention being paid to this function in a number of verticals, and a willingness to go beyond their regulatory compliance obligations. For example, large retailers have reorganized their security teams and made significant investments in personnel and technology. Healthcare organizations, …

  • Combating Digital 'Overage' in a Goods-'Shrinkage' World

    by Chenxi Wang on December 14, 2015

    It’s that time again, when retail businesses across the country expect to see the year's highest volume of consumer transactions. Stores are decked out, discounts are advertised, and shoppers—both physical and cyber—are rolling in. A friend of mine, a manager of several retail branch stores for a national brand, told me that in brick-and-mortar retail stores, they keep in mind the concept of…

  • Weekend Reading: Malware Campaigns and Bitcoin Copycats

    by Jennifer Lawinski on December 11, 2015

    Work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. Each week we bring you the best news and analysis from the information security world, chosen by the field's best writers and editors. This week we've got two stories for you that shed light on cybercrime. Paul Wagenseil, Senior Editor, Security at Tom's…

  • Getting Ready for the Holiday Hacking Season

    by Wendy Nather on December 7, 2015

    Here at the Retail Cyber Intelligence Sharing Center (R-CISC), we're bracing ourselves for one of the busiest times of year — not just for retailers, but for criminals. Of course, not all retailers see huge increases in sales volume right now (when's the last time you got a tire as a present?), but for many, this is a critical period. During peak shopping windows, availability is everything. If a…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 10 Feb 2016 23:26:43 -0500.
© 2016 EMC Corporation. All rights reserved.