Menu

Blogs

Showing Blog Posts: 1–10 of 41 tagged Big Data

  • Ben's Book of the Month: Review of "A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using"

    by Ben Rothke on June 30, 2018

    In the world of information security, the ability to actually implement something and bring ideas to fruition, is commendable. In A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using (ISBN 978-1549836534), author Roger A. Grimes take his decades of experience and give the reader excellent advice on how they can secure their networks and do just that. As the…

  • How Increasing the Amount of Data Can Help us Overcome Information Overflow and Score Fatigue

    by Olov Renberg on May 1, 2018

    What can we learn from our mistakes in automation and what’s in store for this trend in the future? In 2017 we saw plenty of attacks using a wide variety of methods, striking hard against the poorly-protected. We’re also seeing increasingly secure systems, with attacks that still manage to keep up. As much as our security has improved and continues to improve in line with increases in computing…

  • Fast Detection of Breaches is ideal to keep Financial Data Safe

    by Salvatore J. Stolfo on April 10, 2018

    Malicious attacks targeting a company’s confidential financial data with the intent to make a profit is nothing new. What is disturbing, however, is the amount of time the hacker can go unnoticed, in some reported cases of breaches as long as months. In 2015, 32 Ukranian hackers made as much as $100 million by accessing financial earnings press releases stored at PRNewswire and other newswire…

  • Five Security Problems You Don’t Know You Should Be Worried About (and What You Can Do About Them)

    by David J. Blumberg on March 20, 2018

    RSA Conference 2018 USA is approaching and at Blumberg Capital we’ve started discussing what we’re most excited to see. The show floor and breakout sessions are great places to investigate current and upcoming threats and find solutions for them. Of course, many people are interested in the typical security challenges, and while solving them is a requirement for conducting business today, the…

  • Awakening from the Dream: The Security Flaws of Westworld

    by RSAC Editorial Team on December 7, 2016

    *Warning this post or embedded links may contain spoilers. Welcome back newcomers, I hope you enjoyed your time in Sweetwater. The season finale of Westworld hit the Home Box Office crowd Sunday night drawing in 2.2 million viewers. For those unfamiliar with the premise: this new HBO series was inspired by the 1973 film of the same title (written by Michael Crichton) about a futuristic theme park…

  • Businesses Must Secure Customer Data to Ensure Holiday Season Success

    by Nathan Eddy on November 28, 2016

    The holiday season is prime time for the use of credit card skimmers in retail environments. This time of year, the number of transactions increases and the ability of the average retailer to respond to threats is limited due to the amount of activity. Furthermore, most companies are in a change freeze between Thanksgiving and Christmas, slowing the rollout of new or modified security controls. …

  • Big Data Is a Big Cybersecurity Problem for Banks

    by Caitlin Moriarity on June 1, 2016

    How many financial service companies are vulnerable to a data breach? Way too many, according to a new report. The report, put together by data security company Vormetric and issued in partnership with analyst firm 451 Research, shows that a whopping 90 percent of the IT security professionals surveyed in the financial services industry believe that their companies are vulnerable to a possible…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • Breakthroughs in Decision Science and Risk Analysis

    by Ben Rothke on May 3, 2016

    Decision and risk analysis is the discipline comprising the philosophy, theory, methodology, and professional practice necessary to address important decisions in a formal manner. Decision analysis includes many procedures, methods, and tools for identifying, clearly representing, and formally assessing important aspects of a decision, for prescribing a recommended course of action by applying…

  • Hadoop Security: Protecting Your Big Data Platform

    by Ben Rothke on May 2, 2016

    As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices. When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop. …

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 16 Jul 2018 22:21:58 -0400.