Showing Blog Posts: 1–10 of 180 tagged Cybercrime

  • The Customer Threat

    by Wendy Nather on October 17, 2016

    For Cyber Security Awareness Month, we’re taking a closer look at cybercrime, and what organizations can do about it. To address cybercrime, you need both prevention and detection. That’s an obvious-sounding platitude, and it’s not as helpful as it could be, despite it being true. The biggest problem when it comes to detection is that skilled attackers will look exactly like authorized users. …

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Elite Cyber Security Teams: Why They Matter and How to Train Them

    by Juan Bocanegra on September 13, 2016

    The average U.S. company of 1,000 employees or more spends $15 million a year fighting cyber crime, a 20% increase over last year, according to the Ponemon Institute. Hacking attacks cost the average U.S. organization $15.4 million per year—more than double the global average of $7.7 million. One of the reasons for the exorbitant costs of fighting cyber crime is that it now takes an average of 46…

  • Insider Threat: Prevention, Detection, Mitigation, and Deterrence

    by Ben Rothke on August 1, 2016

    Insider threats have been the bane of organizations from time immemorial. When it comes to data threats, for over a decade, the CERT Insider Threat Center has been dedicated to combatting cybersecurity insider threats. Their scientific-based research is the gold standard on the topic. In the newly released Insider Threat: Prevention, Detection, Mitigation, and Deterrence (Butterworth-Heinemann ISBN…

  • Dark Web Globetrotters: A Look at Underground Markets Around the World

    by Jennifer Lawinski on July 25, 2016

    How do cybercriminals operate in the world’s underground markets? Each country has its own distinct markets and own flavor, according to Ryan R. Flores, senior threat research manager at Trend Micro. In his session at RSA Conference APJ 2016 in Singapore, Flores discussed the ways the world’s largest underground markets function, revealing the ways hackers make money off of the data they steal. …

  • Cybersecurity: What Are the Stakes?

    by Jennifer Lawinski on July 18, 2016

    What are the consequences of getting cybersecurity wrong? According to Bryce Boland, CTO for Asia Pacfic of Fire-eye, not having strong defenses isn’t just a question of hurting your brand or your reputation—or even a matter of harming your customers. It’s a question of life or death, and he says cybersecurity teams and business leaders need to pay attention. “They don’t understand the…

  • The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden

    by Ben Rothke on June 22, 2016

    When it comes to Edward Snowden, the question has often been posed as: is he a patriot or a traitor? In The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden (The New Press 1620970635), author Lloyd Gardner, professor emeritus of history at Rutgers University, has written a fascinating work showing that the question of leakers and whistleblowers is…

  • Hadoop Security: Protecting Your Big Data Platform

    by Ben Rothke on May 2, 2016

    As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices. When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop. …

  • Avoid Ransomware Attacks by Removing Attack Vectors

    by Rook Security on April 29, 2016

    To date, there are around about 54 different versions of ransomware, and each one has multiple variants. Every day there is a new ransomware victim, and unlike other malware that has come before, ransomware isn’t looking to steal your information or gain unauthorized access. It just wants your money. Should I pay? Can my files be decrypted? How did this happen? These questions get asked a lot…

  • Hacking for Dummies: Fifth Edition

    by Ben Rothke on April 26, 2016

    I’ve enjoyed Kevin Beaver’s Hacking for Dummies series for over a decade. The first edition came out in 2004 and I reviewed the four th edition here. Now in its fif th edition, the books 22 chapters progress from the basics of security to the hardening of an operating system, to the hacking of Web applications and more. The new edition covers Windows 10 and Linux, and includes a number of more…

This document was retrieved from on Wed, 26 Oct 2016 00:00:09 -0400.
© 2016 EMC Corporation. All rights reserved.