Menu

Blogs

Showing Blog Posts: 1–10 of 214 tagged Hackers and Threats

  • Report: Many Companies Taking Status Quo Approach to Cyber Security at Their Own Peril

    by Tony Kontzer on May 29, 2018

    At the recent RSA Conference in San Francisco, attendees heard a lot of recognition that the cyber security landscape is in flux. A new generation of technologies that generate unprecedented amounts of data has changed the playing field, as has the rise of artificial intelligence. This has resulted not just in more things to secure and more insight to work with, it also has led to an adversary…

  • Hackers and Threats Abound For GDPR, Emperor Snoke

    by RSAC Editorial Team on May 24, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is the final post of a five-part monthly series we kicked off in January 2018 to take a look at how technology, topics and trends from the cybersecurity world compare to characters and themes from the blockbuster Star Wars films. We hope you enjoy our blog series in which the Resistance, filled with hope and determination, …

  • Proactivity and Speed Have Become Essential Components of Cybersecurity

    by Sean Cunningham on May 22, 2018

    Fundamentally, there are two major reasons why enterprises get breached despite ever-increasing cybersecurity budgets. They are typically related to insufficient proactive intelligent threat analysis and addressing advanced malware as it enters an enterprise computer system or network too slowly. Companies can take up to four months to address critical vulnerabilities and, on average, more than…

  • Infiltration - Successes and Pitfalls of Penetrating Hostile Online Groups

    by Lance Cottrell on May 11, 2018

    Few security professionals choose to take control back from their opponents by bringing the fight to their doorstep. However, by working to infiltrate their groups, organizations are better equipped to combat fraud, discover new malware, or look for specific threats. In all cases, researchers and analysts need to avoid identification and the associated risk of blocking or reprisals. In the RSAC…

  • Ben's Book of the Month: Review of "Hacking the Hacker: Learn From the Experts Who Take Down Hackers"

    by Ben Rothke on December 29, 2017

    As 2017 closes, this month’s theme is hackers and threats. We focus on the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these growing information security problems. When it comes to learning the ins and outs of hacking, the various editions of Hacking Exposed are a great resource. The assorted…

  • From the IoT to Insider Threats, 2018 Figures to Keep Security Leaders on Their Toes

    by Tony Kontzer on December 28, 2017

    As the world looks forward to saying goodbye to the crazy year that was 2017, security experts are chiming in about what to expect in 2018, and the news is not good: insider attacks, tax scams, election hacks, and holes created by the Internet of Things lead the list of threats that cyber security teams can expect to be most prominent in the coming year. Probably not the Christmas gift list they…

  • How Enterprises Can Better Combat Advanced Cyber Attacks

    by Sean Cunningham on December 27, 2017

    Numerous relatively recent cyber attacks have successfully breached organizations that should be the cyber world’s equivalent of Fort Knox – exceedingly hard to penetrate. Yet as the infiltration of systems at the likes of the Security and Exchange Commission, National Security Agency and credit bureau giant Equifax underscore, no entity is immune from hackers. Why is this so, even as cyber…

  • Cyber-Game Theory: Focusing on Zero Sum, Not Zero Day

    by Danelle Au on December 22, 2017

    The news covers a major breach seemingly daily. What quickly becomes apparent from these breaches, is that attackers are more likely to draw upon a common arsenal of attacks rather than create a new zero day. In fact, while the victims and the damage vary widely, at the core of attacks are many identical, tried-and-true, tools and techniques. Malware developers, just like software developers, …

  • Shoring Up Online Retail Security Can Ensure A Merry E-Christmas For All

    by Tony Kontzer on December 20, 2017

    One thing we can all be sure of this holiday season: Lots of Americans are choosing to avoid the insanity in shopping malls by firing up their computers, phones and tablets to take care of their Christmas shopping online instead. Even though a steady flow of large-scale data breaches have hit American companies in recent months (hello, Equifax, Whole Foods and Uber, just to throw out a few…

  • Credential Stuffing Threats Facing the eCommerce Industry This Holiday Season

    by Patrick Sullivan on December 19, 2017

    Forecasts call for double digit growth in eCommerce holiday spending. Much like the Dr. Seuss novel, there is a Grinch lurking this holiday season, trying to ruin this joyous time of year. The Grinch, in this case, is the collection of fraudsters working to perform Account Takeover (ATO) attacks. ATO attacks continue to be a growing threat on the Web, targeting any site with a login protecting…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 23 Jul 2018 09:56:03 -0400.