Menu

Blogs

  • Fight The Growing Cybersecurity Challenge in Health Care

    by Amanda Gutshall on July 20, 2017

    Leading image

    All industries need a sound cybersecurity strategy and incident response plan, but that is especially the case for health care given that instances of data breaches are on the rise. In its 2017 Internet Security Threat Report, Symantec noted that health care was listed second in the services industry in cyberbreaches, up 22% in 2016 over 2015. Email attacks – in the form of phishing and ransomware threats - are on the rise. Cybersecurity Ventures sees ransomware attacks growing over the next…

  • The Hardware Hacker: Adventures in Making and Breaking Hardware

    by Ben Rothke on July 17, 2017

    Trying to place The Hardware Hacker: Adventures in Making and Breaking Hardware (No Starch Press 978-1593277581) into a specific category is a challenge. This superb book covers a multitude of topics, from hardware engineering, software design, Chinese manufacturing, to hardware hacking, product development, intellectual property law and more. In the book, author Andrew 'bunnie' Huang details his…

  • Internal and External Forces Mean Healthcare Security Has to Adapt

    by James Christiansen on July 13, 2017

    The complexity of healthcare information security grows daily. Paper records are long gone. With more than 700 security technologies to consider, millions of threat actors to detect and new attack vectors to defend against, simply working harder will not solve the problem. Healthcare is a prime target for hackers due to the vast amounts of private health information (PHI) and the pure complexity…

  • Privacy in Singapore: A Light, If Frequent, Touch

    by Sam Pfeifle on July 12, 2017

    In January, the Personal Data Protection Commission in Singapore will celebrate its fifth anniversary. While any number of privacy regulators have popped up since the PDPC’s establishment – from the Philippines’ to Japan’s to Ghana’s – it’s still easy to think of Singapore as a relatively young governing body. The Personal Data Protection Act didn’t even come into full effect until July 2, 2014. …

  • Effective Cyber Security is All About the Benjamins

    by Humphrey Christian on July 10, 2017

    Who can forget the famous Jerry Maguire quote, “Show me the money!” Fans have referenced it for decades in various contexts for obvious reasons. Money drives decisions, ideas and actions. In enterprises, almost every major decision is driven by money, a.k.a ‘value at risk,’ except when it comes to cyber risk. Attempts thus far to quantify the financial impact of cyber risk have fallen short. The…

  • Financial Services Organizations Are in Need of a Cyber Security Wake-Up Call

    by Tony Kontzer on July 7, 2017

    There's little to suggest that the money you've entrusted to the financial institutions you do business with is in jeopardy. But the data surrounding that money? That's another story. Financial services companies are braced for a period of continued and expanded cyber threats, and the really bad news is that many of them aren't prepared to withstand the onslaught. Recent surveys paint a picture…

  • Digital Smoke Jumpers: Preventing a GDPR Disaster

    by Guy Bejerano on July 5, 2017

    Smoke Jumpers are an elite element of the U.S. Forest Service. They are the men and women trained to jump out of airplanes and into the heart of a forest fire. As a fire rages across rugged terrain inaccessible to conventional equipment, Smoke Jumpers act to stall the fire’s advance. Often they will use techniques that literally “fight fire with fire.” Controlled burns are executed in an inferno’s…

  • Ben's Book of the Month: Review of "Information Security Policies Made Easy"

    by Ben Rothke on June 30, 2017

    This month’s theme is policy & government. As information security becomes even more important in government, business and life, information security policies are being developed to combat the emerging threats and regulate industry. The importance of effective information security policies cannot be overemphasized, as they are the foundation toward implementing information security and ensuring the…

  • Risk Containment Strategies to Avoid the Next Petya

    by Todd Inskeep on June 30, 2017

    By: Todd Inskeep and Chris Taylor Ransomware has been in the headlines with Petya, like WannaCry before it, spreading rapidly around the globe. If you are not familiar with this week’s news, organizations around the globe suffered another ransomware attack on Tuesday including pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, as well as airports and banks. Addressing…

  • Cybersecurity Side Effects of U.S. Healthcare

    by Vitali Kremez on June 29, 2017

    The global healthcare sector has seen no shortage of data breaches in recent years, many of which occurred due to organizations’ access to vast amounts of personal health information (PHI), insufficient security awareness, and increasing reliance on internet-connected technologies. Healthcare organizations in the United States, however, face additional cybersecurity challenges due to a factor…

  • Trump's Cybersecurity Executive Order Will Be Judged by the Action It Inspires

    by Tony Kontzer on June 28, 2017

    The actors behind the WannaCry ransomware attack that swept through hundreds of thousands of computers at organizations around the world couldn't have timed their actions more ironically. WannaCry first reared its head on May 12, the day after President Trump issued an anticipated executive order on federal government cyber security. The order essentially calls for two things: federal agencies…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 23 Jul 2017 16:52:48 -0400.
© 2017 EMC Corporation. All rights reserved.