Blogs

Showing Blog Posts: 11–20 of 101 tagged Hackers and Threats

  • Architecting the Cloud: Design Decisions for Cloud Computing Service Models

    by Ben Rothke on September 8, 2014

    Most books about cloud computing are either extremely high-level quasi-marketing tomes (sometimes written by cloud vendors) about the myriad benefits of the cloud without any understanding of how to practically implement the technology under discussion. The other type of cloud books are highly technical references guides, that provide technical details, but for a limited audience. In Architecting…

  • Mobile Device Management and the Ubiquity of Mobile Authentication

    by John Linkous on September 2, 2014

    We all know that mobile devices are rapidly becoming an absolutely indispensable component of the online world. , This makes mobile device management even more critical, regardless of who is managing the device: a large enterprise, a small business, or just you. Online banking and other sites require a mobile device in order to send a one-time password to authenticate transactions. Smartphone…

  • Cybercrime and Effective Cyber Law Enforcement

    by Robert Moskowitz on August 19, 2014

    These days, it's rare to open a news source (print or digital) without finding a story about cybercrime. Cybercriminals are hacking into databases, stealing credit and debit card account numbers, compromising individuals' identities, and shutting down legitimate websites. These articles highlight how necessary cyber law enforcement has become.Although data security budgets keep climbing and…

  • Upping the Ante: Security in Mobile Health Care Devices

    by John Linkous on July 24, 2014

    You might wonder what mobile healthcare has to do with Stuxnet. A few years ago when the Stuxnet malware first hit, a client asked me to provide an overview of why it was different than the other malware that came before it. At the time, my first inclination was to do exactly that: write up a nice, brief assessment of how Stuxnet was the first tangible evidence of malware affecting "real world"…

  • Government Security and InfoSec: Perfect Together?

    by Joshua Marpet on July 11, 2014

    Besides the white hat/black hat divide implicit within the world of InfoSec, there is another divide of mindsets—that of the corporate InfoSec individual and the government security individual. Their career paths are similar: They go to school, learn on the job, and hang out at conferences and user-group meetings. They decry the problems that software developers put in their paths and…

  • Keeping Private Data Private: Tips and Tricks

    by Joshua Marpet on July 4, 2014

    Companies produce data. Some of it is public data, some private data. The classification of data into public and private is important, but right now, the means to keep data private is incredibly important as well. Keeping data private is a process. It starts with examining the use cases for the data. Is this piece of information going to be used every day? Or does it just need to be stored in…

  • Tough Times for Security on the Internet of Things

    by John Linkous on June 16, 2014

    You've just returned home from a two-week Caribbean vacation. You're tanned, well-rested, and happy. You even got the bump to first class on your flight back home. Everything is great. As the plane lands and you turn on your smartphone, you connect to the "Internet of Things" via your home appliance app, to set the correct temperature in the house and turn on the outside lights. The funny thing…

  • Next-Gen Malware: Destructive Devices

    by Christopher Burgess on June 11, 2014

    The word malware (malicious or malevolent software) has permeated our lexicon, especially for those in the security world. A cyber-criminal's intent has been either to utilize your resources in their criminal endeavors (i.e., put their malware on your system and launch from within your hosted spaces) or to extract information from your entity that could be monetized quickly and effectively. At the…

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 26 Nov 2014 15:10:58 -0500.
© 2014 EMC Corporation. All rights reserved.