Showing Blog Posts: 1–10 of 39 tagged Cyber Warfare

  • Ben's Book of the Month: Review of "Cyber Wars: Hacks that Shocked the Business World"

    by Ben Rothke on August 14, 2018

    The only problem I have with Cyber Wars: Hacks that Shocked the Business World (Kogan Page 978-0749482008) by Charles Arthur is that these breaches really didn’t shock the information security community or the business world. These stories are simply narratives of firms that didn’t take information security seriously and suffered the consequences. In this interesting book, he details some of the…

  • Cyber Attacks on U.S. Cities: The New Norm?

    by RSAC Editorial Team on April 6, 2018

    Many of you likely caught the latest cyber attack that crippled a majority of the city and forced Atlanta into cyber chaos last weekend. This latest attack, on the Southeastern U.S. hub, disabled much of the digital workplace and had some workers reverting to paper and phones. So, is this going to be the new norm in America now? How should cities brace for this sort of attack? Our own Todd…

  • What’s Ahead for 2017: The RSAC Advisory Board Industry Predictions

    by Jennifer Lawinski on December 7, 2016

    After an eventful year, it can be comforting to put a framework around the uncertainty of the future and try to look ahead at what next year may bring. And it’s in that spirit that we talked to the RSA Conference Advisory Board to find out what they think will happen in the world of cybersecurity as we enter 2017. What’s the value of looking at predictions? According to Todd Inskeep, Principal, …

  • The Worrisome State of Nation-State Cyberattacks

    by RSAC Contributor on November 11, 2016

    By Alberto Yépez, Managing Director, Trident Capital Cybersecurity * In September, Yahoo reported that “state-sponsored” hackers stole data on about 500 million users in 2014, probably the largest-ever publicly disclosed cyber-breach. In addition to compromising personal identity data and consumer privacy on a massive scale, this is prodding Verizon Communications to consider renegotiating its…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

  • Election 2016: The State of Cybersecurity

    by Jennifer Lawinski on September 27, 2016

    In the first debate of the 2016 presidential election at Hofstra University, candidates Donald Trump and Hillary Clinton sounded off on the state of cybersecurity. It was a watershed moment for cybersecurity—bringing the work you do into the forefront of the public consciousness and showing that cybersecurity is vital to our national security. But that hasn't always been the case. Jeff Greene, …

  • Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

    by Ben Rothke on September 25, 2016

    Dr. Karyn Hall wrote The Emotionally Sensitive Person: Finding Peace When Your Emotions Overwhelm You to help such people identify emotional triggers, and to develop strong and healthy identity without becoming upset. When it comes to the world of building equipment, while these systems look tough and resilient on the outside, they are often quite sensitive and vulnerable. In Cyber-Physical…

  • The Rise of Nation-State Cyber Attacks Makes Encryption More Crucial Than Ever

    by Robert Ackerman Jr. on September 20, 2016

    No entity is immune from a cyber attack. A successful, jaw-dropping cyber assault against a seemingly impenetrable target occurred again last month. This time, the humbled target was the National Security Agency, the nation’s premier electronic eavesdropper. Three hundred megabytes of sophisticated code developed by the NSA to penetrate computer security systems was posted online for all to see. …

  • Cybersecurity: What Are the Stakes?

    by Jennifer Lawinski on July 18, 2016

    What are the consequences of getting cybersecurity wrong? According to Bryce Boland, CTO for Asia Pacfic of Fire-eye, not having strong defenses isn’t just a question of hurting your brand or your reputation—or even a matter of harming your customers. It’s a question of life or death, and he says cybersecurity teams and business leaders need to pay attention. “They don’t understand the…

  • Dark Territory: The Secret History of Cyber War

    by Ben Rothke on April 13, 2016

    With a catchy title of Dark Territory: The Secret History of Cyber War, (Simon & Schuster ISBN 9781476763255), this new book by Pulitzer Prize winning author Fred Kaplan looked to be a winner. Not that it’s not a good book; but for anyone who’s been involved with information security and cyberwarfare, most of the stories are already known and have long been covered. The book gets it title based on…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2018 & 2019 Editorial Calendars for more info. 

This document was retrieved from on Mon, 17 Jun 2019 11:57:19 -0400.