Menu

Blogs

Showing Blog Posts: 1–10 of 215 tagged Data Security

  • Cross-border Data Flows in Asia: The State of Play

    by Sam Pfeifle on May 3, 2018

    While much of the world is focused on the privacy developments in Europe, where the General Data Protection Regulation is sucking much of the oxygen from the room, Asia has quietly been very busy, indeed, on the privacy front. Hong Kong hosted the most recent privacy commissioners’ conference; the Philippines data protection authority has quickly grown into new voice on the global stage; and…

  • Fast Detection of Breaches is ideal to keep Financial Data Safe

    by Salvatore J. Stolfo on April 10, 2018

    Malicious attacks targeting a company’s confidential financial data with the intent to make a profit is nothing new. What is disturbing, however, is the amount of time the hacker can go unnoticed, in some reported cases of breaches as long as months. In 2015, 32 Ukranian hackers made as much as $100 million by accessing financial earnings press releases stored at PRNewswire and other newswire…

  • Ransomware: Defending Against Digital Extortion

    by Ben Rothke on January 11, 2017

    As an early piece of malware, the 1989 Yankee Doodle virus was limited to playing the patriotic song of the same name. Much has changed over the years, and the rise of ransomware is playing out a very, and much less melodious tone. Countless individuals and businesses of all sizes are being locked out of their own data and their systems made unavailable, until a ransom is paid to the ransomware…

  • Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

    by Ben Rothke on December 29, 2016

    Advanced persistent threats (APT) have gotten significant amounts of press over the last few years. When I first scanned the title of this book, I assumed it was on that topic. While Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies (Syngress 978-0128093160) does details APT, that’s not the main focus. The books…

  • DNS Security: Defending the Domain Name System

    by Ben Rothke on November 22, 2016

    That you are reading this review, and my ability to post it are due in large part due to the Domain Name System (DNS). DNS is Wikipedia describes it is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

  • Top Things Even Security Experts Forget

    by Todd Inskeep on September 28, 2016

    National Cyber Security Awareness Month in October marks a good time for all organizations to think about how they can build and reinforce a workplace culture of security and privacy. This security culture has to be created, fed and reinforced through an investment in activities and engaging training materials throughout the year—not only during the annual security training meetings. As…

  • Mobile Security Vulnerabilities Are Creating Big Problems

    by Sean Cunningham on August 2, 2016

    We hear constantly about devastating cyber attacks on government institutions, corporations and health care providers. Last summer, an attack against the U.S. Office of Personal Management exposed personal information about millions of federal employees. Successful cyber assaults against major American corporations such as Target, Sony and J.P. Morgan Chase also attracted attention. And barely more…

  • Ever Heard of Cross-Border Privacy Rules? You Will

    by Sam Pfeifle on July 7, 2016

    Hopefully, if you’re working at a business in a country that touches the Pacific Ocean, you’ve heard of the Asia Pacific Economic Cooperation. No? Well, they’re a group of 22 nations, including everyone from the United States and Canada to Japan and Singapore to China and Australia, focused on making commerce amongst the nations easier for everyone involved. Part of that work involves e-commerce…

  • Catching Up With Carbon Black’s Ben Johnson

    by Jennifer Lawinski on June 27, 2016

    Ben Johnson is co-founder and Chief Security Strategist at Carbon Black, a partner of M.Tech. In his role he spends the majority of his time meeting with prospects, customers and partners to discuss cybersecurity strategy both with Carbon Black products and also across the stack. We caught up with him to talk about working for the NSA, the security industry and where he sees it evolving before…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 20 May 2018 11:50:16 -0400.