Blogs

Showing Blog Posts: 61–70 of 661

  • Bitcoin and the Future of Crypto-Currency

    by John Linkous on September 23, 2014

    Break out your cryptographically-signed digital wallet and lay your bets: Where is Bitcoin going? As perhaps the best-known—but certainly not the sole—crypto-currency around, Bitcoin has certainly seen its share of media coverage in recent months. And like other hot-button subjects, Bitcoin seems to elicit strong reactions both for and against it. Some view it as a universal currency, free from…

  • Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

    by Ben Rothke on September 22, 2014

    Targeted cyber attacks are for the most part the same as an APT (advanced persistent threat). It was last year’s report on APT1 from Mandiant that brought this important information security topic to the forefront. In Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware, authors Aditya Sood and Richard Enbody write that there are a few different definitions of what a…

  • Does Size Matter in a Data Breach?

    by Fahmida Y. Rashid on September 22, 2014

    Cyber-criminals stole approximately 56 million cards in a five-month attack against Home Depot's point-of-sale systems, the home improvement giant said last Friday. Many media reports honed in on the fact that the breach was larger than the attack that hit Target last year, where 40 million credit and debit cards were stolen. "56 million cards may not be as big as the huge Heartland Payment…

  • Data Privacy in the 21st Century

    by Robert Moskowitz on September 18, 2014

    Privacy impacts both the quality of life and business success. In today's highly automated and digitized world, the concept of "privacy" effectively boils down to data privacy.Simply put, you want to be able to keep certain information from being shared (voluntarily or involuntarily) with others. Although the word "privacy" does not appear in the United States Constitution, the Supreme Court has…

  • Mythbusters: RSAC Edition Part 2

    by Britta Glade on September 17, 2014

    In our last post we looked at RSA Conference myths that typically get associated with our call for submissions process. Here are a few more bubbles we’re more than happy to burst! Myth: RSAC Covers the Same Topics Every Year; Topics are Never Technical in Nature Although RSA Conference focuses primarily on the business of security, we do have technical tracks at our events. Our goal is to help our…

  • Compliance is Not Supposed to be Security

    by Fahmida Y. Rashid on September 17, 2014

    With all the high-profile data breaches at major retailers over the past few months, it’s really tempting to write off PCI DSS as being ineffective. It’s clearly not working, since the security standard clearly didn’t protect these companies from attack. Then again, perhaps we are looking at the standard all wrong. Businesses—and often auditors—measure their security effectiveness against PCI DSS…

  • The Once and Future Network Security Appliance

    by John Linkous on September 16, 2014

    In the early 2000s, the network security appliance became ubiquitous. Beginning with Web application firewalls (WAFs), and eventually extending through all seven layers of the network model, security appliances were being popped into server racks like candy. "Need to filter spam? There's an appliance for that!" "Do you want to analyze the flow data generated on your firewalls? There's an…

  • 3 Reasons to Consider a Managed Security Services Partner

    by Christopher Burgess on September 11, 2014

    Companies are generally cataloged as small, medium, or large. But size does not matter to a cybercriminal or an unethical competitor, who view companies as either soft and vulnerable, or hardened and difficult. Companies need to determine what level of "hardness" they need to achieve, and whether they want to build it themselves, partner with a managed security services entity, or a little of…

  • Mythbusters: RSAC Edition Part 1

    by Britta Glade on September 10, 2014

    The only thing people like more than a myth is separating fact from fiction. We all know some of the more famous myths: the explosive combination of soda and Pop Rocks candy will kill you, alligators roam the sewers of New York City and Walt Disney had himself cryogenically frozen. That said, you don’t have to be Jamie Hynemen or Adam Savage to bust the myths surrounding RSA Conference’s Call for…

  • Security Audit: The Pitfalls of Third-Party Assessments

    by John Linkous on September 9, 2014

    Everyone is aware of last year’s data breach at Target. Millions of records of cardholder data were stolen and Target is still recovering, with current costs at $148 million. What's not well-known, or openly discussed, is the behind-the-scenes conversations the company has had with its PCI assessor and the standards organization. The PCI Security Standards Council (SSC), consisting of major credit…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 18 Dec 2014 18:06:01 -0500.
© 2014 EMC Corporation. All rights reserved.