Showing Blog Posts: 1–10 of 176 tagged Hackers and Threats

  • Getting to Know the RSAC Advisory Board: Wendy Nather

    by Jennifer Lawinski on October 14, 2016

    Name: Wendy Nather Title and company: Research Director, Retail Cyber Intelligence Sharing Center Number of years in the information security industry: 20 RSAC: What was your first job in the infosec industry? Nather: Director of IT Security for the EMEA region of the investment banking division of Swiss Bank Corporation RSAC: What does the RSA Conference 2017 theme, "The Power of Opportunity,"…

  • We Have Entered the New Cyber Reality, But Are We Ready?

    by Chenxi Wang on October 12, 2016

    During the U.S. presidential debate on September 26, the moderator asked the two candidates to address the following topic: Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it? The very fact that this topic has moved beyond IT whiteboards and corporate boardrooms and into the national Situation Room indicates that we…

  • Election 2016: The State of Cybersecurity

    by Jennifer Lawinski on September 27, 2016

    In the first debate of the 2016 presidential election at Hofstra University, candidates Donald Trump and Hillary Clinton sounded off on the state of cybersecurity. It was a watershed moment for cybersecurity—bringing the work you do into the forefront of the public consciousness and showing that cybersecurity is vital to our national security. But that hasn't always been the case. Jeff Greene, …

  • The Rise of Nation-State Cyber Attacks Makes Encryption More Crucial Than Ever

    by Robert Ackerman Jr. on September 20, 2016

    No entity is immune from a cyber attack. A successful, jaw-dropping cyber assault against a seemingly impenetrable target occurred again last month. This time, the humbled target was the National Security Agency, the nation’s premier electronic eavesdropper. Three hundred megabytes of sophisticated code developed by the NSA to penetrate computer security systems was posted online for all to see. …

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Elite Cyber Security Teams: Why They Matter and How to Train Them

    by Juan Bocanegra on September 13, 2016

    The average U.S. company of 1,000 employees or more spends $15 million a year fighting cyber crime, a 20% increase over last year, according to the Ponemon Institute. Hacking attacks cost the average U.S. organization $15.4 million per year—more than double the global average of $7.7 million. One of the reasons for the exorbitant costs of fighting cyber crime is that it now takes an average of 46…

  • SMS Two-Factor Authentication Is No Longer Enough

    by Alisdair Faulkner on August 26, 2016

    With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging. Businesses must verify who they’re transacting with by implementing additional security measures, but at the same time they need to minimize friction and provide seamless user experiences to avoid losing users to competitors. SMS two-factor…

  • Deception, Smart Cities, Ransomware on the Program at RSA Conference 2016 Abu Dhabi

    by Britta Glade on August 18, 2016

    RSA Conference 2016 Abu Dhabi is just a few short months away. Our agenda has been carefully selected by an amazing committee of regional experts, achieving a very interesting balance of sessions designed to address issues that are front and center for our attendees from the area. The RSA Conferences outside of the U.S. (Abu Dhabi and Asia Pacific & Japan, which just concluded in Singapore) provide…

  • RSA Conference Greatest Hits: July 2016

    by Jennifer Lawinski on August 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of July this year? Top Blog Posts 1. The Dangers of…

  • Counterterrorism: The People Factor

    by RSAC Contributor on August 5, 2016

    By Johnathan Tal, President & CEO, TAL Global Corporation The news is rife with terrorist attacks across the world. Information security professionals cannot fix every hole by implementing the latest “solution.” In “Counterterrorism—The People Factor” an interactive and facilitated Peer2Peer session that built on Dr. Southers’ AVSEC presentation at the 2015 RSA Conference, the group shared…

This document was retrieved from on Thu, 27 Oct 2016 14:42:12 -0400.
© 2016 EMC Corporation. All rights reserved.