Menu

Blogs

Showing Blog Posts: 11–20 of 138 tagged Hackers and Threats

  • Introducing Weekend Reading

    by Jennifer Lawinski on December 4, 2015

    How many times have you come across an article that you'd love to read and found yourself closing the tab at the end of the day? Or saving it to Instapaper never to set eyes on it again? There's a lot of excellent news and analysis on information security, and we're experimenting with a new feature here at RSA Conference: Weekend Reading. On Friday afternoon, we'll post a roundup of some of the…

  • Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath

    by Ben Rothke on December 2, 2015

    President George Bush attended a grocer’s convention in 1992 and the New York Times erroneously wrote that Bush was amazed at the scanning technology. While this was clearly not the case, the inaccurate article led to criticism that Bush was out of touch with the average American. In the just released Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, (Crown 055341996X)…

  • Security Operations Center: Building, Operating, and Maintaining your SOC

    by Ben Rothke on November 30, 2015

    Large enterprises have numerous information security challenges. Aside from the external threats; there’s the onslaught of security data from disparate systems, platforms and applications. Getting a handle on the security output from numerous point solutions, generating millions of messages and alerts daily is not a trivial endeavor. As attacks becoming more frequent and sophisticated and with…

  • How to Stay Safe on Cyber Monday

    by Jennifer Lawinski on November 30, 2015

    Tis the season for online fraud. And this year's Cyber Monday is expected to give cybercriminals more potential victims than ever before. Adobe expects online shoppers will spend more than $3 billion online today, and that's just the tip of the iceberg. More than 270 million shoppers are expected to spend more than $83 billion throughout the holiday season, and more than half of those purchases…

  • America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

    by Ben Rothke on November 26, 2015

    Speak to a civil engineer, and it won’t take long until the conversation turns to the sorry state of America’s infrastructure. The civil engineer will let you know that far too many bridges, canals, roads and highways, dams, tunnels, and more are in dangerous condition due to neglected maintenance. Much of America’s infrastructure is highly vulnerable, given that it’s over 50 years old and long…

  • The Network Security Test Lab: A Step-by-Step Guide

    by Ben Rothke on November 4, 2015

    It wasn’t that long ago that building a full network security test lab was a highly expensive endeavor. In The Network Security Test Lab: A Step-by-Step Guide (Wiley 978-1118987056) author Michael Gregg has written a helpful hands-on guide to provide the reader with an economical method to do that. The book is a step-by-step guide on how to create a security network lab, and how to use some of the…

  • The Case for Researcher Self-Regulation

    by Wendy Nather on October 29, 2015

    We're all familiar with the attacker versus defender dynamic, and how it plays out culturally in the security industry -- just say the word "cyber" and see who winces, for example. But it all used to stay "in the family," where red and blue team activities were confined to security professionals, either within security vendor companies or within organizations that had their own security staff. …

  • Protecting your Family Against Threats Associated with the Internet of Toys

    by RSAC Contributor on October 26, 2015

    This post comes from Ed Skoudis, a member of the RSA Conference Advisory Board Remember the Island of Misfit Toys from the enduring holiday classic, Rudolph the Red-Nosed Reindeer? Outcast toys just woefully waiting around for Santa to aid them, hoping to find a suitable home so that they could leave their tear-stained island. Well, those toys wouldn’t have the same problems today—they could be…

  • Network Attacks and Exploitation: A Framework

    by Ben Rothke on October 2, 2015

    The phrase think like a hacker is bandied about incessantly. For most people, they can’t think like a hacker any more than they could think like a podiatrist or a CPA. With that, in Network Attacks and Exploitation: A Framework, (Wiley 978-1118987124), author Matthew Monte has written a great guide that while it won’t help you think like a hacker; it will provide you with the knowledge of how to…

  • Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies

    by Ben Rothke on September 19, 2015

    The legal field is always catching up to advances in technology. Once of the many examples is the Digital Millennium Copyright Act (DMCA), which only went into effect in 1998. About 7 years after the creation of the world wide web. In Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies, author and attorney Brian Wassom provides a forward thinking approach to how…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 12 Feb 2016 21:31:10 -0500.
© 2016 EMC Corporation. All rights reserved.