Blogs

Showing Blog Posts: 11–20 of 86 tagged Hackers and Threats

  • Secure Global Open Source Calling and Message Tools

    by David Wallace on March 25, 2014

    Risk versus reward? Open source versus packaged? Security or flexibility? All of these decisions matter deeply when considering personal safety for international travelers. Because today's cell phones send a signal beacon that identifies your location, network, and movement, companies are turning to more secure open source applications to protect phone conversations and hide the email trail in…

  • Threat Modeling: Designing for Security

    by Ben Rothke on March 3, 2014

    When it comes to measuring and communicating threats, the most ineffective example in recent memory was the Homeland Security Advisory System; which was a color-coded terrorism threat advisory scale. The system was rushed into use and its output of colors was not clear. What was the difference between levels such as high, guarded and elevated? From a threat perspective, which color was more severe -…

  • Cyber Attacks, as Real as They Get

    by John Linkous on January 30, 2014

    Once again, the fundamental nature of the Internet is changing. Moving far beyond the original scope of the Internet, in the early 1990s, the World Wide Web dramatically changed its purpose. We now find ourselves on the cusp of yet another dramatic change, as the Internet of computers gives way to an Internet of things. Unfortunately, that concept also means that this relatively new phase of the…

  • 4 Ways Social Network Engagement Can Derail a Company

    by Christopher Burgess on January 16, 2014

    Social network engagement is mainstream. Rare is the company who does not have a presence on a social network, with engagement including customer education and support, product launch, personnel recruitment, and competitive intelligence. Yet we continue to see occasions where improper employee use of technology can result in loss of intellectual property, inappropriate use of a social network for…

  • Digital Archaeology: The Art and Science of Digital Forensics

    by Ben Rothke on December 23, 2013

    The book Digital Archaeology: The Art and Science of Digital Forensics starts as yet another text on the topic of digital forensics. But by the time you get to chapter 3, you can truly appreciate how much knowledge author Michael Graves imparts. Archaeology is defined as the study of human activity in the past, primarily through the recovery and analysis of the material culture and environmental…

  • Engineering Safe and Secure Software Systems

    by Ben Rothke on December 9, 2013

    At the beginning of chapter 3 of Engineering Safe and Secure Software Systems, author Warren Axelrod (full disclosure: Warren is a friend of mine) quotes two experts who observe that “software engineering is still an oxymoron” and “software engineering, as originally envisioned, does not yet exist”. With such a stipulation it would seem there is little value in writing (and reading) such a book. …

  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    by Ben Rothke on September 10, 2013

    It has been about 8 years since my friend Richard Bejtlich’s (note, that was a full disclosure ‘my friend’) last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this highly informative and actionable…

  • Hacking Exposed Mobile: Security Secrets & Solutions

    by Ben Rothke on August 26, 2013

    Little did anyone know that when the first Hacking Exposed books came out over 15 years ago, that it would launch a set of sequels on topics from Windows, Linux, web development, to virtualization and cloud computing, and much more. It was a series that launched a generation of script kiddies, in addition to security experts. In 2013, the newest edition is Hacking Exposed Mobile Security Secrets …

  • Hacking Exposed Mobile Security Secrets and Solutions

    by Ben Rothke on August 5, 2013

    Little did anyone know that when the first Hacking Exposed book came out over 15 years ago, that it would launch a large set of sequels. In 2013, the newest version is Hacking Exposed Mobile Security Secrets & Solutions. When the first edition of Hacking Exposed was published, Windows was dominant. In 2013, Windows is a dying operating system and mobile is the new king. In the book, the authors…

  • Cloud Computing: Theory and Practice

    by Ben Rothke on July 22, 2013

    With a title like Cloud Computing: Theory and Practice, this book sounds like it is a reference for a general audience, providing a general introduction to what cloud computing is all about. Author Dan Marinescu, Ph.D is a computer science professor at the University of Central Florida, and the book is written for the college level reader, who has a strong interest in cloud computing; combined…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 22 Jul 2014 07:21:52 -0400.
© 2014 EMC Corporation. All rights reserved.