Menu

Blogs

Showing Blog Posts: 1–10 of 216 tagged Hackers and Threats

  • The Dichotomy of the IoT: Huge Business Opportunities, But Even Bigger Cyber Security Holes

    by Tony Kontzer on December 19, 2018

    So, about this Internet of Things, uh, thing. There may be a slight problem. As the world rushes to connect anything and everything to the Internet, the resulting explosion of IoT devices presents one of the most challenging and complicated threats that cyber security professionals have faced. IoT devices are popping up everywhere in a mad rush for data. They're on factory floors to help keep…

  • 2019 Could Be the Worst Year Yet for Cyber Breaches

    by Robert Ackerman Jr. on December 14, 2018

    Three months ago, it happened again – a high profile company with sophisticated cybersecurity was breached, compromising the credit card details of 565,000 customers. The victim was British Airways. Hackers managed to work around the airline’s encryption, among other protective measures, and siphoned the data over a two-week period ending in early September. What set this cyber episode apart was…

  • Report: Many Companies Taking Status Quo Approach to Cyber Security at Their Own Peril

    by Tony Kontzer on May 29, 2018

    At the recent RSA Conference in San Francisco, attendees heard a lot of recognition that the cyber security landscape is in flux. A new generation of technologies that generate unprecedented amounts of data has changed the playing field, as has the rise of artificial intelligence. This has resulted not just in more things to secure and more insight to work with, it also has led to an adversary…

  • Hackers and Threats Abound For GDPR, Emperor Snoke

    by RSAC Editorial Team on May 24, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is the final post of a five-part monthly series we kicked off in January 2018 to take a look at how technology, topics and trends from the cybersecurity world compare to characters and themes from the blockbuster Star Wars films. We hope you enjoy our blog series in which the Resistance, filled with hope and determination, …

  • Proactivity and Speed Have Become Essential Components of Cybersecurity

    by Sean Cunningham on May 22, 2018

    Fundamentally, there are two major reasons why enterprises get breached despite ever-increasing cybersecurity budgets. They are typically related to insufficient proactive intelligent threat analysis and addressing advanced malware as it enters an enterprise computer system or network too slowly. Companies can take up to four months to address critical vulnerabilities and, on average, more than…

  • Infiltration - Successes and Pitfalls of Penetrating Hostile Online Groups

    by Lance Cottrell on May 11, 2018

    Few security professionals choose to take control back from their opponents by bringing the fight to their doorstep. However, by working to infiltrate their groups, organizations are better equipped to combat fraud, discover new malware, or look for specific threats. In all cases, researchers and analysts need to avoid identification and the associated risk of blocking or reprisals. In the RSAC…

  • Ben's Book of the Month: Review of "Hacking the Hacker: Learn From the Experts Who Take Down Hackers"

    by Ben Rothke on December 29, 2017

    As 2017 closes, this month’s theme is hackers and threats. We focus on the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these growing information security problems. When it comes to learning the ins and outs of hacking, the various editions of Hacking Exposed are a great resource. The assorted…

  • From the IoT to Insider Threats, 2018 Figures to Keep Security Leaders on Their Toes

    by Tony Kontzer on December 28, 2017

    As the world looks forward to saying goodbye to the crazy year that was 2017, security experts are chiming in about what to expect in 2018, and the news is not good: insider attacks, tax scams, election hacks, and holes created by the Internet of Things lead the list of threats that cyber security teams can expect to be most prominent in the coming year. Probably not the Christmas gift list they…

  • How Enterprises Can Better Combat Advanced Cyber Attacks

    by Sean Cunningham on December 27, 2017

    Numerous relatively recent cyber attacks have successfully breached organizations that should be the cyber world’s equivalent of Fort Knox – exceedingly hard to penetrate. Yet as the infiltration of systems at the likes of the Security and Exchange Commission, National Security Agency and credit bureau giant Equifax underscore, no entity is immune from hackers. Why is this so, even as cyber…

  • Cyber-Game Theory: Focusing on Zero Sum, Not Zero Day

    by Danelle Au on December 22, 2017

    The news covers a major breach seemingly daily. What quickly becomes apparent from these breaches, is that attackers are more likely to draw upon a common arsenal of attacks rather than create a new zero day. In fact, while the victims and the damage vary widely, at the core of attacks are many identical, tried-and-true, tools and techniques. Malware developers, just like software developers, …

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 & 2019 Editorial Calendars for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 20 Jan 2019 09:58:05 -0500.