Menu

Blogs

Showing Blog Posts: 1–10 of 186 tagged Hackers and Threats

  • What’s Ahead for 2017: The RSAC Advisory Board Industry Predictions

    by Jennifer Lawinski on December 7, 2016

    After an eventful year, it can be comforting to put a framework around the uncertainty of the future and try to look ahead at what next year may bring. And it’s in that spirit that we talked to the RSA Conference Advisory Board to find out what they think will happen in the world of cybersecurity as we enter 2017. What’s the value of looking at predictions? According to Todd Inskeep, Principal, …

  • Secure Data Deletion

    by Ben Rothke on November 30, 2016

    The law of conservation of energy is that energy remains constant; it can be neither created or destroyed. It simply transforms from one form to another. While not a perfect analogy, data on a hard drive or other physical media is quite difficult to completely transform to the state of fully erased. While many have lost files and been unsuccessful in retrieving them, for an information security…

  • Businesses Must Secure Customer Data to Ensure Holiday Season Success

    by Nathan Eddy on November 28, 2016

    The holiday season is prime time for the use of credit card skimmers in retail environments. This time of year, the number of transactions increases and the ability of the average retailer to respond to threats is limited due to the amount of activity. Furthermore, most companies are in a change freeze between Thanksgiving and Christmas, slowing the rollout of new or modified security controls. …

  • DNS Security: Defending the Domain Name System

    by Ben Rothke on November 22, 2016

    That you are reading this review, and my ability to post it are due in large part due to the Domain Name System (DNS). DNS is Wikipedia describes it is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most…

  • Camouflaging State-Sponsored Malware Attacks

    by RSAC Contributor on November 21, 2016

    By Gunter Ollmann, CSO, Vectra Networks Most organizations continue to struggle with malware-based intrusions. Despite the deployment of policies, user education, enforcement chokepoints, data inspection, and regular assessment of defenses, malware remains the primary method of breaching the corporate network. While anti-virus vendors persist in publishing exposés on the latest and most advanced…

  • RSAC 2017 Speaker Submissions Parallel Industry Predictions and Real-World Events

    by Britta Glade on November 17, 2016

    This year has been the year of extortions and, more than ever before, conversations around cybersecurity are more mainstream with increased media coverage of everything from major enterprise hacks to dinner table discussions around the upcoming election and privacy. And with cyber-criminals collecting $209 million in just the first three months of 2016, we have seen an increase in overall consumer…

  • RSA Conference 2016 Abu Dhabi: Highlights From Day Two

    by Jennifer Lawinski on November 16, 2016

    RSA Conference 2016 Abu Dhabi was in full swing on Wednesday morning. The day kicked off with keynote addresses that touched on different facets of the cybersecurity industry. Sahir Hidayatullah, CEO of Smokescreen Technologies, began his keynote address with the tale of the U.S. Army’s ghost army, a unit that used deception tactics, a term we saw a lot of here at RSA Conference. The ghost army…

  • How to Avoid Wasting Time on False Positives

    by Carl Manion on November 7, 2016

    False positives. Those annoying notifications that make you panic at first, but after further investigation, turn out to be nothing to worry about. At first, they may seem like a minor inconvenience, but what happens when you have hundreds—or even thousands—of them occurring every day and you find yourself wasting 75 percent (or more) of your time? Unfortunately, this is exactly what’s happening…

  • Hack-Proof Your Life Now! The New Cybersecurity Rules

    by Ben Rothke on November 2, 2016

    Far Side creator Gary Larson wrote that a high-school biology teacher once told him she showed her class a number of Far Side comics at the beginning of the school year and most of the students didn't get the humor. She said a goal of the class was that by the end of the year, they should have learned enough science to see the humor in the comics. Similarly, by the time a novice reader finishes …

  • How to Spot (and Stop) Insider Threats

    by Jennifer Lawinski on November 1, 2016

    In light of recent news that the FBI arrested another NSA contractor for allegedly stealing state secrets in August, we sat down with insider threat expert Dawn Cappelli, Vice President and Chief Information Security Officer at Rockwell Automation, to talk about what businesses can do to combat malicious insider activity. RSAC: What are the different types of insider threats companies need to be…

This document was retrieved from https://www.rsaconference.com/blogs on Sat, 10 Dec 2016 01:52:31 -0500.
© 2016 EMC Corporation. All rights reserved.