Menu

Blogs

Showing Blog Posts: 1–10 of 15 by Rook Security

Rook Security

Rook Security

Rook Security

  • 10 Attributes of a NextGen Security Program

    by Rook Security on November 30, 2016

    By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to…

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Good Security Belongs in the Background

    by Rook Security on August 4, 2016

    By Mike Patterson You may have read that Jason Bourne took the #1 spot at the domestic box office last weekend, with $60 million in ticket sales—one of the better debuts of the summer. That translates into approximately 6 million people seeing the movie, and probably less than a dozen noticed the minor role Rook Security and I played in the fictitious Exocon show at the Aria in the second half of…

  • What Do Hackers Want from Professional Sports Teams?

    by Rook Security on June 2, 2016

    By Mike Patterson, Vice President of Strategy, Rook Security Recently, the Milwaukee Bucks basketball organization went public with a successful W-2 phishing attack that targeted its players and employees. While this is probably not the first attack of its kind, it is a new known data point in attacks against sports teams. In 2015, incidents targeted baseball player scouting data (involving the St. …

  • Avoid Ransomware Attacks by Removing Attack Vectors

    by Rook Security on April 29, 2016

    To date, there are around about 54 different versions of ransomware, and each one has multiple variants. Every day there is a new ransomware victim, and unlike other malware that has come before, ransomware isn’t looking to steal your information or gain unauthorized access. It just wants your money. Should I pay? Can my files be decrypted? How did this happen? These questions get asked a lot…

  • Building Security Into IoT Development Is Critical

    by Rook Security on March 30, 2016

    By Rushabh Vyas More and more devices connected to the Internet of Things are being used across the world every day. Why? They’re more available than they were before, and the hardware and applications involved in networking devices are inexpensive. Also, people want convenience. I mean who wouldn’t want to be able to feed or watch their pets from work, or even your child’s soccer game? As with…

  • Why Cybersecurity Information Sharing Is Important

    by Rook Security on March 17, 2016

    By Tom Gorup The more information, the better. Right? In most cases, that is the truth. However, the way in which information is shared makes all the difference. Companies don’t share cybersecurity information because they fear attacker retribution and legal recourse. They don’t want to cause further retaliation from an attacker or show so much transparency that they could possibly cause the…

  • Sometimes, You Need to Call the Professionals

    by Rook Security on December 8, 2015

    Implementing a strong cybersecurity program requires IT security personnel that most companies don't have on staff. The reasons are many, including lack of funds and a lack of awareness of security needs. It's also tough to find qualified IT security professionals. It's a difficult job that involves working long hours, sometimes on holidays and weekends. A security operations center (SOC) analyst…

  • Insuring Cyber the Same Way as Natural Disasters

    by Rook Security on September 30, 2015

    There is no doubt that cyberinsurance is a fast-growing product with an important role in our current landscape where security breaches are happening at a breakneck pace. And many claim the market is nowhere near fully saturated...lots of companies remain unprotected. Most every Risk Manager has a disaster plan for what we typically think of as natural disasters: hurricane, fire, even polar…

  • Treat Yourself to a SPA, Not a Pen Test

    by Rook Security on August 27, 2015

    A lot of companies are asked to do a pen test by their clients, because they think a pen test will let them know if their business partner’s technology is “secure” against cyber threats. The scan happens. The areas that need to be fixed are fixed. And the client feels warm and fuzzy inside. However, this feeling is misleading as the company isn't necessarily more secure— all it says is that you…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs/by/162/security on Sat, 22 Jul 2017 00:57:13 -0400.
© 2017 EMC Corporation. All rights reserved.