Menu

Blogs

  • Social Data Mining: Human-Induced Threats

    by Dr. Mohammed Alani on October 16, 2017

    When I walk around in Abu Dhabi, or in any city that I’ve travelled to recently, there is always someone taking a selfie or a video to share instantly on their social media channels. According to recent statistics by the Federal Competitiveness and Statistics Authority, around 93% of UAE residents are active Facebook users and 75% use YouTube regularly. Being active on social media can be…

  • Achieving the Ultimate Buy-In: Getting Everyone in Your Organization Thinking and Acting with the Data Security in Mind

    by Tony Kontzer on October 12, 2017

    It's no longer a secret that relying on your company's IT security team to be the sole provider of workplace cyber security is folly. Recent incidents such as the WannaCry ransomware attack and the catastrophic Equifax breach remind us that in today's cloud-dominated, always-connected, device-centric world, everyone connected to a business—from employees and management to contractors and…

  • The Real Machine Learning Revolution in Endpoint Security is Yet to Come

    by Ryan Berg on October 10, 2017

    It’s hard to ignore that machine learning has taken over much of the discourse in today’s technology circles. It wasn’t that long ago that you needed IBM’s Deep Blue to beat a human at chess. Now there are few games that a computer has not bested humans at. Whether it’s Google’s AlphaGo and Go, Elon Musk’s OpenAI and DOTA, or Libratus built by a pair of researchers to beat the best at no-limit Texas…

  • On the Internet, nobody knows you’re a dog...but they may know your password

    by Todd Inskeep on October 9, 2017

    Famously, according to the New Yorker cartoon: ‘On the Internet, nobody knows you’re a dog.’ However, today in the wake of numerous breaches, it may seem like everyone may know everything about you. The reality, naturally, is somewhere in between. As we enter another National Cybersecurity Awareness month, key information – your identity, your passwords, and your access have become more important…

  • It’s Time for a Security Checkup during National Cyber Security Awareness Month

    by Mike Janke on October 5, 2017

    Most of us in the world of cybersecurity spend our days trying to solve complex security problems in one form or another as managers, engineers, researchers, investors or policy makers. Yet it is the fundamental basics of digital daily life that are to blame for the massive amount of money lost by the average citizen, not to mention all the aggravation. So, appropriately, October is National…

  • National Cyber Security Awareness Month 2017

    by RSAC Editorial Team on October 2, 2017

    October is once again upon us and with it comes the return of Major League Baseball playoffs, college football rivalry games, the return of Stranger Things to Netflix and, of course, a month of cyber security tips and best practices. As you may know, October is National Cyber Security Awareness Month (NCSAM) - an annual campaign to raise awareness about the importance of cybersecurity. NCSAM is…

  • Ben's Book of the Month: Review of "IT Security Risk Control Management: An Audit Preparation Plan"

    by Ben Rothke on September 29, 2017

    This month the theme is technology, and when it comes to information security, there is a whole lot of that around. From firewalls to switches, IDS to SIEM, to a lot of other hardware and software with 3 and 4-letter acronyms, technology is at the heart of information security. But how does an enterprise ensure that the huge amounts they spend are implementing good security. That is where an…

  • The Middle East's Cybersecurity Mirage—Warning Signs in the Desert

    by Sahir Hidayatullah on September 29, 2017

    17th November, 2016 8:45PM GMT+3. The date and time may not seem significant, but it was a portent about the future of cybersecurity in the Persian Gulf. This was the time the Shamoon 2 malware waited until before launching a data destruction payload that spread through the networks of Saudi Arabia's civil aviation agency and other Gulf State organizations, wreaking havoc. The fact that it moved…

  • Could the Equifax Breach Have Been Avoided?

    by Tony Kontzer on September 28, 2017

    Much has been written about how Equifax could have prevented the recent breach that exposed personal information on 143 million Americans with one simple act that's supposedly on the to-do list of every corporate security practitioner: Stay up to date on patches. We've read about how the Apache Software Foundation had released a patch to address a vulnerability in its Struts web app-building…

  • Why The Equifax Breach Should Be Doing More Than Scaring Us

    by Tony Kontzer on September 26, 2017

    Do we need look any further than the recent Equifax breach for compelling evidence of what a cyber security incident can do to a business? A couple of weeks ago, Equifax was just one of three credit reporting agencies Americans knew housed their financial data. Today? It is being held up as an example of the risks of housing valuable data. We've all seen the eye-popping number over and over…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 18 Oct 2017 05:28:10 -0400.
© 2017 EMC Corporation. All rights reserved.