Menu

Blogs

Showing Blog Posts: 1–10 of 194 tagged Hackers and Threats

  • Resources for the Community: USA Today’s Homeland Security Edition

    by RSAC Editorial Team on January 12, 2017

    December was a blur for many of us as we were closing out end of year activities, buying last minute presents, traveling to visit family and, of course, standing in line to see Rogue One: A Star Wars Story. And although I could spend many blogs discussing the events of Jedha City or Scarif, I’ll stay on topic and fill you in on what you may have missed during all the holiday hustle and bustle:…

  • Getting to Know the RSAC Advisory Board: Todd Inskeep

    by RSAC Editorial Team on January 4, 2017

    Name: Todd Inskeep Title and company: Principal, Booz Allen Hamilton Number of years in the information security industry: 34 years RSAC: What was your first job in the infosec industry? Inskeep: Summer Intern at the Naval Research Labs working on Radio Voice Security RSAC: What does the RSA Conference 2017 theme, “The Power of Opportunity,” mean to you? Inskeep: For me, the Power of Opportunity…

  • Building an Internet of Things Risk Model in the Wake of Mirai

    by Gib Sorebo on December 30, 2016

    For many of us, Internet of Things (IoT) security has been nothing more than a cocktail party conversation. It sounds interesting but doesn’t necessarily affect our work or personal lives even if our job includes cybersecurity. While it is clearly a concern for operators of medical devices or industrial control systems, it seems less relevant for the typical enterprise or consumer. After all, …

  • Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

    by Ben Rothke on December 29, 2016

    Advanced persistent threats (APT) have gotten significant amounts of press over the last few years. When I first scanned the title of this book, I assumed it was on that topic. While Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies (Syngress 978-0128093160) does details APT, that’s not the main focus. The books…

  • Hollywood Cyber vs. Vegas Cyber

    by Wendy Nather on December 28, 2016

    You can go one of two ways with depicting cybersecurity in movies and TV shows: you can depict it so seriously that every technical mistake generates an outraged howl from the infosec pros, or you can romanticize it so that it becomes a cult classic. On the one side, you have the complaints about CSI:Cyber; on the other, you have every picture of Angelina Jolie on rollerblades. You have…

  • The Weaponization of IoT: A Shot Across The Bow – What We Must Do Today

    by Craig Spiezle on December 19, 2016

    IoT devices continue to make headlines for their innovation and as new holiday gifts, with millions of new devices being sold weekly. But with the proliferation of these new devices comes a sobering reality: they are introducing new threats daily. There is real and present danger here, and it will only get worse. While we have experienced devices being compromised and taken over in the past…

  • Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

    by Ben Rothke on December 18, 2016

    In chapter 2 of Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis (Syngress ISBN 978-0128033401), authors Brett Shavers and John Bair discuss the Tor browser and how it can offer tremendous levels of security and privacy. Their goal in the book is to help security professionals and investigators use investigative techniques against those employing such…

  • Ransomware Unbound: Critical Knowledge for a Growing Threat

    by Nathan Eddy on December 12, 2016

    Ransomware is the most pervasive form of malware out there, as attackers have shifted their focus away from more traditional attacks, and the number of new strains of ransomware continues to grow exponentially. Using ransomware, the criminal takes control of a user’s laptop and data and requires payment to get the control back, and tries to price the crime at a high enough value that it is worth…

  • What’s Ahead for 2017: The RSAC Advisory Board Industry Predictions

    by Jennifer Lawinski on December 7, 2016

    After an eventful year, it can be comforting to put a framework around the uncertainty of the future and try to look ahead at what next year may bring. And it’s in that spirit that we talked to the RSA Conference Advisory Board to find out what they think will happen in the world of cybersecurity as we enter 2017. What’s the value of looking at predictions? According to Todd Inskeep, Principal, …

  • Secure Data Deletion

    by Ben Rothke on November 30, 2016

    The law of conservation of energy is that energy remains constant; it can be neither created or destroyed. It simply transforms from one form to another. While not a perfect analogy, data on a hard drive or other physical media is quite difficult to completely transform to the state of fully erased. While many have lost files and been unsuccessful in retrieving them, for an information security…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 21 Jan 2017 10:20:20 -0500.
© 2017 EMC Corporation. All rights reserved.