Menu

Blogs

Showing Blog Posts: 1–10 of 184 tagged Cybercrime

  • Love Really is Blind: Cyber Criminals Are Attracted to the Vulnerability of Dating Apps and Sites

    by Tony Kontzer on February 21, 2019

    Just about all of us have been there. By some estimates, it's more likely than not that any given American had some data stolen last year. Compromised data is an increasingly common part of our lives. Sometimes it's a school that's breached. Other times it's an email provider. Occasionally it's a financial services company. But dang it, when cyber criminals target love, they've gone too far, and…

  • How Educational Institutions Are Failing to Adequately Protect Student Data

    by Tony Kontzer on February 28, 2018

    With security at the forefront of hot button issues across the country right now, one threat often gone unnoticed to students' well-being is the growing frequency with which their personal data is being compromised. Cyber criminals' increased interest in attacking education systems imperils students' financial futures and privacy, and gives parents a reason to question whether schools are up to…

  • Ransomware: Defending Against Digital Extortion

    by Ben Rothke on January 11, 2017

    As an early piece of malware, the 1989 Yankee Doodle virus was limited to playing the patriotic song of the same name. Much has changed over the years, and the rise of ransomware is playing out a very, and much less melodious tone. Countless individuals and businesses of all sizes are being locked out of their own data and their systems made unavailable, until a ransom is paid to the ransomware…

  • RSAC 2017 Speaker Submissions Parallel Industry Predictions and Real-World Events

    by Britta Glade on November 17, 2016

    This year has been the year of extortions and, more than ever before, conversations around cybersecurity are more mainstream with increased media coverage of everything from major enterprise hacks to dinner table discussions around the upcoming election and privacy. And with cyber-criminals collecting $209 million in just the first three months of 2016, we have seen an increase in overall consumer…

  • The Customer Threat

    by Wendy Nather on October 17, 2016

    For Cyber Security Awareness Month, we’re taking a closer look at cybercrime, and what organizations can do about it. To address cybercrime, you need both prevention and detection. That’s an obvious-sounding platitude, and it’s not as helpful as it could be, despite it being true. The biggest problem when it comes to detection is that skilled attackers will look exactly like authorized users. …

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Elite Cyber Security Teams: Why They Matter and How to Train Them

    by Juan Bocanegra on September 13, 2016

    The average U.S. company of 1,000 employees or more spends $15 million a year fighting cyber crime, a 20% increase over last year, according to the Ponemon Institute. Hacking attacks cost the average U.S. organization $15.4 million per year—more than double the global average of $7.7 million. One of the reasons for the exorbitant costs of fighting cyber crime is that it now takes an average of 46…

  • Insider Threat: Prevention, Detection, Mitigation, and Deterrence

    by Ben Rothke on August 1, 2016

    Insider threats have been the bane of organizations from time immemorial. When it comes to data threats, for over a decade, the CERT Insider Threat Center has been dedicated to combatting cybersecurity insider threats. Their scientific-based research is the gold standard on the topic. In the newly released Insider Threat: Prevention, Detection, Mitigation, and Deterrence (Butterworth-Heinemann ISBN…

  • Dark Web Globetrotters: A Look at Underground Markets Around the World

    by Jennifer Lawinski on July 25, 2016

    How do cybercriminals operate in the world’s underground markets? Each country has its own distinct markets and own flavor, according to Ryan R. Flores, senior threat research manager at Trend Micro. In his session at RSA Conference APJ 2016 in Singapore, Flores discussed the ways the world’s largest underground markets function, revealing the ways hackers make money off of the data they steal. …

  • Cybersecurity: What Are the Stakes?

    by Jennifer Lawinski on July 18, 2016

    What are the consequences of getting cybersecurity wrong? According to Bryce Boland, CTO for Asia Pacfic of Fire-eye, not having strong defenses isn’t just a question of hurting your brand or your reputation—or even a matter of harming your customers. It’s a question of life or death, and he says cybersecurity teams and business leaders need to pay attention. “They don’t understand the…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 & 2019 Editorial Calendars for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 24 Apr 2019 12:32:16 -0400.