Showing Blog Posts: 11–20 of 85 tagged Security

  • Intellectual Property at Risk

    by Christopher Burgess on June 23, 2014

    Walk about your office and ask your employees, "Are you appropriately protecting the company's intellectual property (IP)?" Count how many responses resemble, "Oh, I don't have access to any IP, I work in XYZ department, not R&D." Such answers cause cringes at every level, as it demonstrates multiple points of failure: failure to enlighten the workforce that IP involves so much more than just R&D…

  • A Tale of Two Cultures: Cool or Vigilant. Can the Security Industry Have Both?

    by Alex Bender on June 6, 2014

    We live in an age when a company’s “cool corporate culture” can actually come to influence them as a brand. Multi-billion dollar company Google offers an open, startup-like culture with an office layout that encourages spontaneous interactions. Earlier this year, the media was abuzz with the news that popular online shoe and clothing shop Zappos would transform itself from a traditional…

  • Disruption Can Wound or Kill, With or Without Social Engineering

    by Christopher Burgess on June 2, 2014

    The realization that your team is in the sights of individuals performing social engineering attacks is alarming. To think the information they elicited or the actions they induced were used to perform attacks involving your customers—well, you'd naturally feel panicked. But what if you were that customer, whose data or whose network has been made vulnerable by the actions of your team? Think it…

  • Mobile Devices, Cyber Attacks, and the New Frontier

    by John Linkous on May 26, 2014

    As the unrelenting game of attackers versus defenders continues in the world of information security, mobile cyber attacks are becoming a more desirable attack vector for hackers, criminal organizations, and nation-states to gain access to data. The past few years have started to see long-term, concerted campaigns targeting mobile devices, most notably the Red October malware that targeted…

  • National and International Security Awareness Initiatives

    by Christopher Burgess on May 23, 2014

    Programs such as National Cyber Security Awareness Month (US) and Safer Internet Day (global) are designed to heighten international awareness for both companies and consumers. But who benefits? Individuals? Small and medium businesses (SMBs)? Enterprises? Individual Awareness Over the course of the past five years, National Cyber Security Awareness Month (NCSAM) has evolved from providing…

  • The Security Threat Posed by Social Engineering

    by Christopher Burgess on April 10, 2014

    When one uses the words "security threat" and "social engineering" together, the analogy of hand-in-glove is appropriate. At the RSA Conference 2014, this was adroitly explained in the session "When the Phone Is More Dangerous Than Malware" hosted by Christopher Hadnagy and Michele Fincher, both of Social-Engineer, Inc., as they walked the attendees through how social engineers collect, sort, …

  • As Companies Get Social, Network Security Grows

    by David Wallace on April 8, 2014

    "As long as it happens to someone else" is a key part of data protection and network security. Deter the bad guys long enough and they'll go looking for a weaker target. Social and personal connections can help immensely with daily work but make for scary nightmares. The IT department can "MacGyver" systems to guard against technical leaks or intrusion, but then they have to hope that humans…

  • CISOs, Business Security, and the Business of Security

    by Christopher Burgess on April 3, 2014

    So you want to be a CISO, really? Business security, or the business of security, has evolved and is evolving, according to Todd Fitzgerald of Grant Thornton International, who shared his thoughts in his RSA Conference 2014 session, "So Why on Earth Would You WANT to Be a CISO?" Fitzgerald captured the challenge facing all who are thinking of moving into the CISO career track when he shared a…

  • RFID: Connecting Users and Devices

    by Christopher Burgess on March 13, 2014

    Radio-frequency identification (RFID) chips are permeating our life at every level—at work, at home, and on the go. And while there is a important distinction between RFID and near field communications (NFC) chips, the premise is similar. For example, you may carry a dongle which opens your automobile door when it's within 20 feet of the vehicle. Whereas if you have a credit card from a European…

  • Customer Privacy: The Surprising Driver of Today's Massive Vendor Security Movement

    by John Linkous on February 6, 2014

    Within recent weeks, a plethora of vendors have announced massive security changes to their products and platforms. From Google's migration of all web certificates to 2048-bit encryption keys to Twitter's implementation of session-specific encryption keys via forward secrecy, vendors are rapidly implementing security controls across their infrastructure, often at substantial cost. The driver…

This document was retrieved from on Mon, 05 Oct 2015 00:01:41 -0400.
© 2015 EMC Corporation. All rights reserved.