Menu

Blogs

Showing Blog Posts: 71–80 of 292 tagged Cybersecurity

  • Year in Review: Your Favorite Stories of 2015

    by Jennifer Lawinski on December 30, 2015

    The end of the year is always a time for reflection, and as we start thinking about our New Year's Resolutions, it can be helpful to take a look at what we learned the year before--or at least in what we liked reading. Last year you were interested in a wide variety of topics including books on cybersecurity, methods of attack and learning more about the RSA Conference. What were your favorite…

  • Vulnerabilities for OS X and iOS Take the Spotlight in 2015

    by RSAC Contributor on December 29, 2015

    This post comes from Liviu Arsene, security analyst at Bitdefender. The common belief that Apple’s OS X and iOS are not as prone to vulnerabilities and attacks as other popular operating systems has been put to the test in 2015. As OS X and iOS adoption increases in the enterprise segment—partly due to a new generation of “millennial” managers—attackers will likely target the two platforms more. …

  • Security in 2016: The RSAC Advisory Board's Industry Predictions

    by Jennifer Lawinski on December 21, 2015

    The security landscape is constantly evolving, and while it's hard to predict the future, the experts of the RSAC Advisory Board have rubbed their crystal balls and offer some insight into where they see the industry moving next year. What can we expect to see in 2016? Healthcare data will be more valuable to hackers, although experts disagree on how high-profile hacks will be next year. …

  • Why a Code Freeze Is a Cybercriminal’s Best Friend

    by Tony Bradley on December 17, 2015

    As we wind down 2015 and businesses prepare to shut down for the extended holiday break, many will also implement a code freeze. The code freeze is a normal operating procedure that occurs regularly as an application or software update nears release, or whenever there’s a crucial business milestone—like end of quarter or end of fiscal year. Unfortunately, a code freeze also means that…

  • EMV Leads to Increased Digital Risks This Holiday Shopping Season

    by Alisdair Faulkner on December 16, 2015

    The deadline for U.S. retailers and credit card processors to adopt the Europay-MasterCard-Visa (EMV) global standard chip cards passed in October, and those who have yet to adopt the technology will now be liable for any point-of-sale (POS) fraud losses. Given the high-profile retail data breaches in recent years—including Home Depot, Michael’s, Neiman Marcus and Sally Beauty—all of which were…

  • Protecting a Ghost Town: How Stay Secure When Your Staff is on Vacation

    by Tony Bradley on December 15, 2015

    The doors are locked. The lights are off. All through the office not a creature is stirring, not even a mouse. Well, one can hope at least. In a few weeks that's how most organizations will look. Business will all-but-cease and many employees will be home celebrating the holidays with family and friends. Hackers, cybercriminals, and malware, on the other hand, will be putting in extra hours to…

  • How to Enjoy the Holidays in Peace (While Keeping the Network Secure)

    by Tony Bradley on December 10, 2015

    I’m not sure why we even bother showing up to work in the month of December. The first week is spent coming down off of the Thanksgiving-gluttony food coma and frantically shopping online during work hours to find holiday gift bargains. We show up for the next two weeks because of a mandatory requirement to be physically present (even though you’ve already mentally checked out) and you’re just…

  • Getting Ready for the Holiday Hacking Season

    by Wendy Nather on December 7, 2015

    Here at the Retail Cyber Intelligence Sharing Center (R-CISC), we're bracing ourselves for one of the busiest times of year — not just for retailers, but for criminals. Of course, not all retailers see huge increases in sales volume right now (when's the last time you got a tire as a present?), but for many, this is a critical period. During peak shopping windows, availability is everything. If a…

  • Introducing Weekend Reading

    by Jennifer Lawinski on December 4, 2015

    How many times have you come across an article that you'd love to read and found yourself closing the tab at the end of the day? Or saving it to Instapaper never to set eyes on it again? There's a lot of excellent news and analysis on information security, and we're experimenting with a new feature here at RSA Conference: Weekend Reading. On Friday afternoon, we'll post a roundup of some of the…

  • Reflections on RSA Conference 2015 Abu Dhabi

    by RSAC Contributor on December 3, 2015

    RSA Conference goes to the Middle East for the first time with RSA Conference 2015 Abu Dhabi. Rashed Al Oraimi, lead technologist at Booz Allen Hamilton, provided the following report. It was the last working day of the week in Abu Dhabi, and most of us were planning our weekends with family, yet the floors at Emirate Palace hotel were jam-packed with computer security professionals and companies…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 03 May 2016 00:57:10 -0400.
© 2016 EMC Corporation. All rights reserved.