Menu

Blogs

Showing Blog Posts: 1–10 of 36 tagged Hacking

  • The Security Reading Room: The Best Information Security Books of 2016

    by Ben Rothke on February 5, 2017

    There were a lot of good information security books that came out in 2016, and many that were not worth reading. With that, here’s my list of the information security books stand out as the best, listed in no particular order: The Car Hacker's Handbook: A Guide for the Penetration Tester - plus ça change, plus c’est la même chose. Lots of features combined with poor security make cars the next big…

  • Getting to Know the RSAC Advisory Board: Todd Inskeep

    by RSAC Editorial Team on January 4, 2017

    Name: Todd Inskeep Title and company: Principal, Booz Allen Hamilton Number of years in the information security industry: 34 years RSAC: What was your first job in the infosec industry? Inskeep: Summer Intern at the Naval Research Labs working on Radio Voice Security RSAC: What does the RSA Conference 2017 theme, “The Power of Opportunity,” mean to you? Inskeep: For me, the Power of Opportunity…

  • Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

    by Ben Rothke on December 18, 2016

    In chapter 2 of Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis (Syngress ISBN 978-0128033401), authors Brett Shavers and John Bair discuss the Tor browser and how it can offer tremendous levels of security and privacy. Their goal in the book is to help security professionals and investigators use investigative techniques against those employing such…

  • RSA Conference Greatest Hits: July 2016

    by Jennifer Lawinski on August 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of July this year? Top Blog Posts 1. The Dangers of…

  • What Do Hackers Want from Professional Sports Teams?

    by Rook Security on June 2, 2016

    By Mike Patterson, Vice President of Strategy, Rook Security Recently, the Milwaukee Bucks basketball organization went public with a successful W-2 phishing attack that targeted its players and employees. While this is probably not the first attack of its kind, it is a new known data point in attacks against sports teams. In 2015, incidents targeted baseball player scouting data (involving the St. …

  • The Car Hacker's Handbook: A Guide for the Penetration Tester

    by Ben Rothke on March 26, 2016

    The history of technology is replete with instances of security researchers finding a flaw in a product. The vendors then discount the issue and mock the findings; saying it’s only a theoretical vulnerability. They may even resort to suing the researchers. When the vulnerability becomes widespread, these vendors then run to patch their insecure product. We are in that situation now with…

  • Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want

    by Ben Rothke on February 28, 2016

    Information security is a hot career area. There supply of qualified information security professionals is out of proportion to the growing demand. A recent article in Forbes states (erroneously in my opinion) there will be 1 million cybersecurity job openings in 2016. Whatever the number truly is, nearly every security department in corporate American is struggling to fully their thein security…

  • Today’s ‘Unbreakable’ Encryption Is Tomorrow’s Security Weakness

    by Tony Bradley on January 8, 2016

    We hear a lot about encryption as a magic silver bullet solution that will secure and protect our data. Businesses and consumers are directed to employ encryption wherever possible, and in the wake of any data breach one of the first questions that comes up—often from encryption vendors with a marketing agenda—is whether the compromised data was protected with encryption. Encryption evolves over…

  • Weekend Reading: Malware Campaigns and Bitcoin Copycats

    by Jennifer Lawinski on December 11, 2015

    Work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. Each week we bring you the best news and analysis from the information security world, chosen by the field's best writers and editors. This week we've got two stories for you that shed light on cybercrime. Paul Wagenseil, Senior Editor, Security at Tom's…

  • Getting Ready for the Holiday Hacking Season

    by Wendy Nather on December 7, 2015

    Here at the Retail Cyber Intelligence Sharing Center (R-CISC), we're bracing ourselves for one of the busiest times of year — not just for retailers, but for criminals. Of course, not all retailers see huge increases in sales volume right now (when's the last time you got a tire as a present?), but for many, this is a critical period. During peak shopping windows, availability is everything. If a…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2017 Editorial Calendar or 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 24 Nov 2017 17:13:33 -0500.
© 2017 EMC Corporation. All rights reserved.