Menu

Blogs

Showing Blog Posts: 1–10 of 1049

  • Japanese Users Need to Be More Proactive About Cybersecurity

    by Jennifer Lawinski on May 24, 2016

    When it comes to cybersecurity, many users in Japan don't practice what they preach. According to the ESET Japan Cyber-Savviness Report 2016, users in Japan are well informed about cybersecurity and tend to shy away from taking risks online, but they still have a ways to go before they are adequately protected from cybercrime. More than 70 percent of Japanese survey respondents said they didn't…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • Corporate Ransomware Attacks and What to Expect Next

    by Liviu Arsene on May 20, 2016

    Organizations have been plagued by sophisticated malware attacks in the past year, showing that cybercriminals have shifted their attention to more profitable targets and that organizations might be more prone to malware than previously believed. Oddly enough, only 38 percent of organizations currently have a strategy to deal with destructive malware, as compared to 43 percent in 2015, according…

  • Threat Modeling: Peers Discuss Risk-Based Application Security Design at RSAC 2016

    by RSAC Contributor on May 18, 2016

    By William Zhang, Lead Security Architect, The World Bank Group The Peer2Peer session Threat Modeling for Risk-Based Application Security Design was fully attended, with delegates representing healthcare, government, financial service, software industry, retail, industrial, and other industries. For which projects do you require a threat modeling exercise? Some organizations require all projects…

  • The Most Overlooked Ways to Prevent Getting Hacked

    by Caitlin Moriarity on May 17, 2016

    In a world where cybersecurity threats are continually evolving, you'd be surprised how simple it is to prevent getting hacked. "The difference between a company that gets hacked and the company that doesn't get hacked, I've found," says Norman Guadagno, chief evangelist at Carbonite, "is the difference between who clicks a link in their email, and who doesn’t." Threats are everywhere All business…

  • StoryCorps @ RSAC: I Might Die Because of a Software Bug

    by Jennifer Lawinski on May 16, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. This month's conversation features Joshua Corman and Marie Moe. Corman is the Director, Cyber Statecraft, at the Atlantic Council and founder of IamTheCalvary. Moe is a research scientist at …

  • Perfecting Risk-Based Authentication: Deciphering Multi-Layered Identity Proofing Strategies

    by Gasan Awad on May 12, 2016

    Fraudsters are a smart group. With each fraud prevention method that’s introduced, they figure out ways to work around it. Organizations must be careful when using technologies that fraudsters may have compromised, but that doesn’t mean throwing everything out and starting from scratch. As with many things, in security and fraud prevention one tool is never enough. An alarm system makes your home…

  • Peers Talk Architecting for Security in the Age of Agile Development

    by RSAC Contributor on May 11, 2016

    By David Graves, Distinguished Technologist and Security Architect at Hewlett Packard Enterprise The increasing acceptance of Agile development is driving shorter release cycles, sometimes placing application security at risk. Has the pace of Agile development displaced strong solution architecture? Twenty-five security professionals gathered at RSA Conference 2016 to discuss this and related…

  • Cross-border Is the New Normal

    by Alisdair Faulkner on May 10, 2016

    It's no secret digital consumers increasingly purchase goods and services via cross-border transactions. Digital commerce has essentially created a global economy without borders. In fact, according to Nielsen’s Global Connected Commerce Report, in February 2016, 57 percent of the respondents made a cross-border e-commerce purchase in the past six months. Recognizing this trend, businesses are…

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 25 May 2016 18:47:06 -0400.
© 2016 EMC Corporation. All rights reserved.