Menu

Blogs

Showing Blog Posts: 1–10 of 164 tagged Hackers and Threats

  • Cybersecurity: What Are the Stakes?

    by Jennifer Lawinski on July 18, 2016

    What are the consequences of getting cybersecurity wrong? According to Bryce Boland, CTO for Asia Pacfic of Fire-eye, not having strong defenses isn’t just a question of hurting your brand or your reputation—or even a matter of harming your customers. It’s a question of life or death, and he says cybersecurity teams and business leaders need to pay attention. “They don’t understand the…

  • RSA Conference Greatest Hits: June 2016

    by Jennifer Lawinski on July 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of June this year? Top Blog Posts 1. The Dangers of…

  • Pinpoint: How GPS Is Changing Technology, Culture, and Our Minds

    by Ben Rothke on July 5, 2016

    It’s a rare technology that becomes so pervasive and ubiquitous that for many people it becomes a necessary entity. Over the last decade, GPS is one of those technologies. In Pinpoint: How GPS Is Changing Technology, Culture, and Our Minds (W.W. Norton & Company ISBN 0393089126), author Greg Milner has written a highly engaging and fascinating book on the story of GPS. More than just an…

  • How Cybersecurity Impacts Customer Loyalty

    by Alisdair Faulkner on June 21, 2016

    When it comes to banking, e-commerce and other online activities, fraud is one of consumers’ top concerns. In fact, insights from a recent First Annapolis and ThreatMetrix consumer study showed that more than half of consumers (55 percent) are extremely concerned about the risks of banking and payments-related fraud, with 46 percent indicating their fraud concerns have increased in the past two…

  • RSA Conference APJ Poll: Are You Prepared for a Cyberattack?

    by Jennifer Lawinski on June 20, 2016

    When it comes to cybersecurity, professionals working across the globe know that they’re fighting tough enemies who only need you to make one mistake to get into your network. As we gear up for RSA Conference Asia Pacific & Japan 2016 in Singapore this July, we took the time to ask you, the cybersecurity community in the region, a few questions to get a feel for what you’re dealing with every day. …

  • Banks Need to Rethink Cybersecurity After Recent Heists Through SWIFT

    by Caitlin Moriarity on June 17, 2016

    Cyberheists are on the rise. But how are hackers getting into financial institutions with some of the best security on the planet? Through a third party, it turns out. A number of major international cyberheists have been connected to the interbank SWIFT messaging system. Tien Phong Commercial Joint Stock Bank, based in Hanoi, Vietnam, said in a May 15 statement that it had recently foiled an…

  • Plan, Pray, or Pay: What to Do After a Ransomware Attack

    by Ryan Berg on June 14, 2016

    If you’re not planning, then you’re praying. And praying doesn’t lower your odds of having to pay when ransomware hits. In the immediate aftermath of a ransomware attack—once you get past the initial confusion and shock—you’re likely to find the limited options available to you were determined by choices you made (or didn’t make) weeks and months ago. Yes, there are things you can do to try to…

  • iOS Attacks: A Rapidly Evolving Threat Landscape

    by Yair Amit on June 9, 2016

    Early in the adoption of enterprise mobility, iOS was considered the “better” choice. A more stable and consistent operation system was preferable for developing custom apps, and Apple’s iOS operating system was believed to be inherently more secure than Google’s Android due to the controlled app store ecosystem and better app sandboxing mechanisms. Fast forward to today and we see that…

  • The Dangers of Skimmers and Safes in Hotel Rooms

    by Dale "Woody" Wooden on June 6, 2016

    This is part two of my series on hotel safety for protecting intellectual property and personal information. We will be starting where my past article “Executive Hotel Rooms Are A Hackers Treasure Chest” ended. You’re in your room and ready for bed. You put your wallet or purse on the nightstand and settle down for sleep. That is where the fun begins. You have heard about RF skimmers—the product…

  • Small Business: Wake Up to Growing Cyber Threats

    by Robert Ackerman Jr. on June 3, 2016

    A few months ago, Rokenbok Education, a Solana Beach, Calif., maker of educational toys, was facing perhaps the quintessential nightmare of the 21 st century. Cyber criminals had encrypted the company’s computer files, rendering them useless. The hackers were deploying ransomware. If Rokenbok wanted the data unlocked, it would have to pay a ransom. As the New York Times reported, the company…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Sun, 24 Jul 2016 18:18:45 -0400.
© 2016 EMC Corporation. All rights reserved.