Menu

Blogs

Showing Blog Posts: 1–10 of 146 tagged Data Breach

  • HIPAA, GDPR and the Dreaded “Second Hop” Security Problem

    by Salvatore J. Stolfo on June 18, 2018

    Malicious attacks targeting a healthcare company’s confidential data are nothing new. The industry has lived under the stringent HIPAA requirements for years and many have made great strides deploying systems to manage and protect their data. What is disturbing, however, is the number of breaches that still occur. A recent example: LifeBridge is just now disclosing a breach that happened in…

  • Flipping the Script on Cyber Threats from Being the Hunted to the Hunter

    by Chris Dodunski on May 8, 2018

    Data is the new currency and cybercriminals have been incredibly successful at weaponizing tools, techniques and procedures to exploit corporate networks. We have seen this time and time again from Equifax and Home Depot to Uber and Sony PlayStation. These security breaches are not only a considerable expense but also damaging to corporate reputations. In most cases, by the time you react, the…

  • The New Security Boundaries and How to Protect Them

    by Peter Merkulov on September 23, 2016

    The traditional network perimeter is a relic—a vestige of a time before the advent of easy mobility. And security strategies that focus on traditional perimeter defense are a symptom of change resistance and of a fixation on the past rather than a vision for the future. Consider this; the latest Ericsson mobility report says that 90 percent of the world’s population over the age of six will own a…

  • The Rise of Nation-State Cyber Attacks Makes Encryption More Crucial Than Ever

    by Robert Ackerman Jr. on September 20, 2016

    No entity is immune from a cyber attack. A successful, jaw-dropping cyber assault against a seemingly impenetrable target occurred again last month. This time, the humbled target was the National Security Agency, the nation’s premier electronic eavesdropper. Three hundred megabytes of sophisticated code developed by the NSA to penetrate computer security systems was posted online for all to see. …

  • Mobile Security Vulnerabilities Are Creating Big Problems

    by Sean Cunningham on August 2, 2016

    We hear constantly about devastating cyber attacks on government institutions, corporations and health care providers. Last summer, an attack against the U.S. Office of Personal Management exposed personal information about millions of federal employees. Successful cyber assaults against major American corporations such as Target, Sony and J.P. Morgan Chase also attracted attention. And barely more…

  • Do Data Breaches Affect Company Value?

    by Liviu Arsene on July 29, 2016

    With malware growing more prevalent, possibly nearing 600 million samples in 2016, the average cost of a data breach has been estimated to reach $4 million. Gartner, which had estimated worldwide spending on information security reaching $75.4 billion in 2015, sees a 26 percent probability that a company will experience one or more data breaches within a 24-hour period. While fixing a data breach…

  • RSA Conference Greatest Hits: June 2016

    by Jennifer Lawinski on July 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of June this year? Top Blog Posts 1. The Dangers of…

  • They Know Everything About You: How Data-Collecting Corporations and Snooping Government Agencies Are Destroying Democracy

    by Ben Rothke on April 7, 2016

    When Woody Guthrie first wrote his classic “This Land Is Your Land”, it was an angry protest song. Joe Klein writes in Woody Guthrie: A Life that Guthrie began writing the song out of anger and frustration. To a degree author Robert Scheer has written a book that expresses his frustration and anger at the abuse of power when it comes to misuse of personal digital privacy and the ensuing…

  • Weekend Reading: Verizon Breached, Cloud Threats and More

    by Jennifer Lawinski on March 25, 2016

    We know your work days are so busy that many of the week's best cybersecurity stories often get lost in the shuffle. That's where Weekend Reading comes in. Each Friday, we'll bring you the best news and analysis from the cybersecurity world to help you stay on top of industry issues. This week's big cybersecurity news comes from security journalist Brian Krebs, who broke the news this week that …

  • The Cybersecurity Act of 2015 Is a Necessary Stake in the Ground

    by Robert Ackerman Jr. on March 18, 2016

    The Cybersecurity Act of 2015 is approaching its three-month birthday, but you can be excused if you’re oblivious to that. After all, many people probably don’t know it even exists. Very quietly, the law—the first major piece of Congressional cybersecurity legislation, one designed to address the explosive growth of successful cyberattacks—was signed into law in mid-December 2015 by President…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 23 Jun 2018 09:59:00 -0400.