Menu

Blogs

Showing Blog Posts: 1–10 of 29 tagged Hacking

  • Today’s ‘Unbreakable’ Encryption Is Tomorrow’s Security Weakness

    by Tony Bradley on January 8, 2016

    We hear a lot about encryption as a magic silver bullet solution that will secure and protect our data. Businesses and consumers are directed to employ encryption wherever possible, and in the wake of any data breach one of the first questions that comes up—often from encryption vendors with a marketing agenda—is whether the compromised data was protected with encryption. Encryption evolves over…

  • Weekend Reading: Malware Campaigns and Bitcoin Copycats

    by Jennifer Lawinski on December 11, 2015

    Work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. Each week we bring you the best news and analysis from the information security world, chosen by the field's best writers and editors. This week we've got two stories for you that shed light on cybercrime. Paul Wagenseil, Senior Editor, Security at Tom's…

  • Getting Ready for the Holiday Hacking Season

    by Wendy Nather on December 7, 2015

    Here at the Retail Cyber Intelligence Sharing Center (R-CISC), we're bracing ourselves for one of the busiest times of year — not just for retailers, but for criminals. Of course, not all retailers see huge increases in sales volume right now (when's the last time you got a tire as a present?), but for many, this is a critical period. During peak shopping windows, availability is everything. If a…

  • Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath

    by Ben Rothke on December 2, 2015

    President George Bush attended a grocer’s convention in 1992 and the New York Times erroneously wrote that Bush was amazed at the scanning technology. While this was clearly not the case, the inaccurate article led to criticism that Bush was out of touch with the average American. In the just released Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, (Crown 055341996X)…

  • Security Operations Center: Building, Operating, and Maintaining your SOC

    by Ben Rothke on November 30, 2015

    Large enterprises have numerous information security challenges. Aside from the external threats; there’s the onslaught of security data from disparate systems, platforms and applications. Getting a handle on the security output from numerous point solutions, generating millions of messages and alerts daily is not a trivial endeavor. As attacks becoming more frequent and sophisticated and with…

  • America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

    by Ben Rothke on November 26, 2015

    Speak to a civil engineer, and it won’t take long until the conversation turns to the sorry state of America’s infrastructure. The civil engineer will let you know that far too many bridges, canals, roads and highways, dams, tunnels, and more are in dangerous condition due to neglected maintenance. Much of America’s infrastructure is highly vulnerable, given that it’s over 50 years old and long…

  • The Network Security Test Lab: A Step-by-Step Guide

    by Ben Rothke on November 4, 2015

    It wasn’t that long ago that building a full network security test lab was a highly expensive endeavor. In The Network Security Test Lab: A Step-by-Step Guide (Wiley 978-1118987056) author Michael Gregg has written a helpful hands-on guide to provide the reader with an economical method to do that. The book is a step-by-step guide on how to create a security network lab, and how to use some of the…

  • The Case for Researcher Self-Regulation

    by Wendy Nather on October 29, 2015

    We're all familiar with the attacker versus defender dynamic, and how it plays out culturally in the security industry -- just say the word "cyber" and see who winces, for example. But it all used to stay "in the family," where red and blue team activities were confined to security professionals, either within security vendor companies or within organizations that had their own security staff. …

  • SANS NetWars at RSAC 2015

    by Fahmida Y. Rashid on May 15, 2015

    SANS Institute brought its NetWars competition to RSA Conference 2015 in San Francisco. A hands-on, interactive learning environment, SANS NetWars lets information security professionals develop and master skills they need in their jobs. The program focuses on developing skills in vulnerability assessment, system hardening, malware analysis, digital forensics, incident response, packet analysis, …

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

    by Ben Rothke on March 30, 2015

    Technology is neutral and non-moral. It’s the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 06 Feb 2016 18:14:18 -0500.
© 2016 EMC Corporation. All rights reserved.