Menu

Blogs

Showing Blog Posts: 1–10 of 402 tagged Cybersecurity

  • Cyber Pearl Harbor, Global Pandemic or Alien Invasion?

    by Todd Inskeep on May 18, 2017

    For over twenty years, experts have warned of a “Cyber Pearl Harbor.” Like the Dec.7, 1941 attack, this cyber-attack would both create tremendous damage and galvanize organizations, particularly in the US, to improve computer and information security. For nearly as long, other experts have spoken against this scenario, positing alternative scenarios and analogies. All-in-all, there’s been a…

  • WannaCry Ransomware: What We Know So Far

    by RSAC Editorial Team on May 16, 2017

    Late in the day on Friday, May 12, a massive ransomware attack hit 200K organizations in 150 countries. The ransomware that has been named “WannaCry,” took advantage of Windows systems that had not yet been updated with Microsoft’s March security patch. Per the ransomware playbook, this attack locked people out of their computers, encrypted files and demanded those impacted pay up to $300 in…

  • Reactions to the US Cybersecurity Executive Order

    by RSAC Editorial Team on May 16, 2017

    After months of waiting, the security industry received an update from the US government on its promised focus on cybersecurity. Late last week President Trump signed the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Although other recent policies have been met with a variety of opinions across both sides of the aisle, this…

  • What the Super Bowl Teaches About Cyber Security – Are Security and Operations Uniting Like a Team?

    by Allison Cramer on February 5, 2017

    I survived the play offs, wondered why anyone watches the Pro Bowl, and then set my focus on the Super Bowl. Who would win – who had the best skills, best coaching, best records, etc. As I wondered I started to see similarities between the relationships of the players and the relationships of security and operations teams. Stick with me for a moment. At the simplest level, the defense is there to…

  • Financial Cybersecurity Regulations Are a Win for Privacy

    by Tom Boyden on January 30, 2017

    Beginning this year, financial and insurance companies in the state of New York will have to comply with some of the country’s most stringent and far-reaching cybersecurity regulations. In September, Governor Andrew Cuomo announced the new rules, which are meant to protect consumers, companies, and our financial infrastructure from the growing threat of cyberattacks. The regulations in their…

  • Planning for RSA Conference? How to optimize your experience

    by Kenneth Morrison on January 29, 2017

    Attending the RSA Conference (RSAC) for the first time can be a somewhat daunting experience. As anyone who has attended a past event will confirm, there is a veritable wealth of opportunity packed into a few days in the heart of one of the world’s most exciting cities! So how do you optimize your time to maximize your benefit? First, RSAC is designed to cover the interests of many different IT…

  • Getting Users Committed to Security: Simple tips to increase user interest and commitment around common threats to their system

    by Jack Danahy on January 26, 2017

    Users are vulnerable to clever malware campaigns and social engineering, making them a common first link in the attack chain. Even in major breaches and ransomware attacks affecting multiple systems or sizable organizations, the entry point is usually created by a single mistake made by some unwitting user. These mistakes are also a meaningful distraction for IT teams, as more than 50% of the…

  • Banking Apps Look to Balance Convenience, Security

    by Nathan Eddy on January 25, 2017

    Mobile banking technology is poised to become ubiquitous. Soon connecting with your banker via video will be as easy and commonplace as checking your account balance on your smartphone. In the not-so-distant future, customers will expect to always have the option to chat face-to-face with their banker either on a mobile app, from an ATM or at a kiosk or meeting room in the branch itself. With…

  • Strengthen Your Cybersecurity Readiness in 2017

    by Abby Johnson on January 18, 2017

    Once again, 2016 was a noteworthy year for cybersecurity. With major data breaches affecting millions of customers and companies from the IRS, LinkedIn, Dropbox, Yahoo! and beyond. According to ESG and the Information Systems Security Association (ISSA) Research report, organizations increased cybersecurity funding in 39% of cases, and professionals implemented new access controls at the same…

  • History is Repeating Itself (In a Good Way)

    by Feris Rifai on January 17, 2017

    History is repeating itself. Before Sarbanes Oxley passed in 2002, having a director that was a financial expert in the American corporate boardroom was not the norm. In fact, CFOs who were originally thought of as financial gatekeepers are more than ever before held accountable for the integrity, accuracy and traceability of the financial information presented to the board. Today, we all know…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 22 Oct 2017 02:35:24 -0400.
© 2017 EMC Corporation. All rights reserved.