Menu

Blogs

Showing Blog Posts: 1–10 of 178 tagged Enterprise Defense

  • The New Security Boundaries and How to Protect Them

    by Peter Merkulov on September 23, 2016

    The traditional network perimeter is a relic—a vestige of a time before the advent of easy mobility. And security strategies that focus on traditional perimeter defense are a symptom of change resistance and of a fixation on the past rather than a vision for the future. Consider this; the latest Ericsson mobility report says that 90 percent of the world’s population over the age of six will own a…

  • Perfecting Risk-Based Authentication: Applying the Right Tools to Lessen Risk

    by Gasan Awad on September 7, 2016

    Eighty percent of respondents to Kroll’s Global Fraud Report 2015/2016 said their organizations became more vulnerable to fraud in the past year. This means organizations need to be more aggressive in their collective approach to keeping fraud under control, including using a combination of fraud mitigation, identity proofing and account validation. In today’s competitive market, organizations…

  • Cybersecurity: The Quick and the Dead

    by Robert Statica on August 15, 2016

    More than two million people were affected by cyber crime in the UAE last year and not a week goes by without a report of a business having its files hacked or leaked. The UAE, as a global business hub and point of exchange, is particularly vulnerable to attackers from across the world. CEOs and their colleagues in IT and cybersecurity simply can’t afford to wait until they become a victim of an…

  • The Future of Cloud Security Starts with the Hypervisor

    by Liviu Arsene on June 28, 2016

    The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, and Gartner estimates it has reached its peak, having significantly matured. OS container-based virtualization and cloud computing have gained in popularity, with organizations' server virtualization rates reaching up to 75 percent. While hypervisor technologies have been split into Type 1 (native – or bare…

  • Peers Discuss Building Security Data Science Capability

    by RSAC Contributor on June 23, 2016

    By Clay Carter, Security Architect Leader, GE Digital Security data science is an emerging space and it was clear from our RSA Conference Peer2Peer session, Building Security Data Science Capability, that many companies are still just starting to explore how they can build their security data science capability. The group was hesitant at first to contribute, but we were fortunate to have a few…

  • Banks Need to Rethink Cybersecurity After Recent Heists Through SWIFT

    by Caitlin Moriarity on June 17, 2016

    Cyberheists are on the rise. But how are hackers getting into financial institutions with some of the best security on the planet? Through a third party, it turns out. A number of major international cyberheists have been connected to the interbank SWIFT messaging system. Tien Phong Commercial Joint Stock Bank, based in Hanoi, Vietnam, said in a May 15 statement that it had recently foiled an…

  • Plan, Pray, or Pay: What to Do After a Ransomware Attack

    by Ryan Berg on June 14, 2016

    If you’re not planning, then you’re praying. And praying doesn’t lower your odds of having to pay when ransomware hits. In the immediate aftermath of a ransomware attack—once you get past the initial confusion and shock—you’re likely to find the limited options available to you were determined by choices you made (or didn’t make) weeks and months ago. Yes, there are things you can do to try to…

  • RSA Conference APJ 2016: Catching Up with Todd Inskeep

    by Jennifer Lawinski on June 10, 2016

    As RSA Conference Asia Pacific & Japan draws near, we sat down with RSA Conference Advisory Board member Todd Inskeep, Principal, Commercial Consulting, Booz Allen Hamilton, to talk about the cybersecurity landscape in Asia, and why RSA Conference APJ is more relevant now for attendees than ever before. RSA Conference: What’s unique about the APJ cybersecurity landscape? Inskeep: APJ cybersecurity…

  • iOS Attacks: A Rapidly Evolving Threat Landscape

    by Yair Amit on June 9, 2016

    Early in the adoption of enterprise mobility, iOS was considered the “better” choice. A more stable and consistent operation system was preferable for developing custom apps, and Apple’s iOS operating system was believed to be inherently more secure than Google’s Android due to the controlled app store ecosystem and better app sandboxing mechanisms. Fast forward to today and we see that…

  • RSA Conference Greatest Hits: May 2016

    by Jennifer Lawinski on June 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of May this year? Top Blog Posts 1. Executive Hotel…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Sun, 25 Sep 2016 13:23:50 -0400.
© 2016 EMC Corporation. All rights reserved.