Showing Blog Posts: 1–10 of 42 tagged Big Data

  • Ben's Book of the Month: Review of "Malware Data Science: Attack Detection and Attribution"

    by Ben Rothke on December 31, 2018

    The proverb “Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime,” is known by almost everyone. In Malware Data Science: Attack Detection and Attribution (No Starch Press 978-1-59327-859-5), authors Joshua Saxe and Hillary Sanders artfully show the reader how not only to avoid being a victim of malicious code, but how to actively defend against it, and…

  • Ben's Book of the Month: Review of "A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using"

    by Ben Rothke on June 30, 2018

    In the world of information security, the ability to actually implement something and bring ideas to fruition, is commendable. In A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using (ISBN 978-1549836534), author Roger A. Grimes take his decades of experience and give the reader excellent advice on how they can secure their networks and do just that. As the…

  • How Increasing the Amount of Data Can Help us Overcome Information Overflow and Score Fatigue

    by Olov Renberg on May 1, 2018

    What can we learn from our mistakes in automation and what’s in store for this trend in the future? In 2017 we saw plenty of attacks using a wide variety of methods, striking hard against the poorly-protected. We’re also seeing increasingly secure systems, with attacks that still manage to keep up. As much as our security has improved and continues to improve in line with increases in computing…

  • Fast Detection of Breaches is ideal to keep Financial Data Safe

    by Salvatore J. Stolfo on April 10, 2018

    Malicious attacks targeting a company’s confidential financial data with the intent to make a profit is nothing new. What is disturbing, however, is the amount of time the hacker can go unnoticed, in some reported cases of breaches as long as months. In 2015, 32 Ukranian hackers made as much as $100 million by accessing financial earnings press releases stored at PRNewswire and other newswire…

  • Five Security Problems You Don’t Know You Should Be Worried About (and What You Can Do About Them)

    by David J. Blumberg on March 20, 2018

    RSA Conference 2018 USA is approaching and at Blumberg Capital we’ve started discussing what we’re most excited to see. The show floor and breakout sessions are great places to investigate current and upcoming threats and find solutions for them. Of course, many people are interested in the typical security challenges, and while solving them is a requirement for conducting business today, the…

  • Awakening from the Dream: The Security Flaws of Westworld

    by RSAC Editorial Team on December 7, 2016

    *Warning this post or embedded links may contain spoilers. Welcome back newcomers, I hope you enjoyed your time in Sweetwater. The season finale of Westworld hit the Home Box Office crowd Sunday night drawing in 2.2 million viewers. For those unfamiliar with the premise: this new HBO series was inspired by the 1973 film of the same title (written by Michael Crichton) about a futuristic theme park…

  • Businesses Must Secure Customer Data to Ensure Holiday Season Success

    by Nathan Eddy on November 28, 2016

    The holiday season is prime time for the use of credit card skimmers in retail environments. This time of year, the number of transactions increases and the ability of the average retailer to respond to threats is limited due to the amount of activity. Furthermore, most companies are in a change freeze between Thanksgiving and Christmas, slowing the rollout of new or modified security controls. …

  • Big Data Is a Big Cybersecurity Problem for Banks

    by Caitlin Moriarity on June 1, 2016

    How many financial service companies are vulnerable to a data breach? Way too many, according to a new report. The report, put together by data security company Vormetric and issued in partnership with analyst firm 451 Research, shows that a whopping 90 percent of the IT security professionals surveyed in the financial services industry believe that their companies are vulnerable to a possible…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • Breakthroughs in Decision Science and Risk Analysis

    by Ben Rothke on May 3, 2016

    Decision and risk analysis is the discipline comprising the philosophy, theory, methodology, and professional practice necessary to address important decisions in a formal manner. Decision analysis includes many procedures, methods, and tools for identifying, clearly representing, and formally assessing important aspects of a decision, for prescribing a recommended course of action by applying…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2019 Editorial Calendar for more info. 

This document was retrieved from on Sun, 18 Aug 2019 00:48:47 -0400.