Menu

Blogs

Showing Blog Posts: 1–10 of 38 tagged Mobile

  • Maintaining Security When IT is on Holiday

    by Nathan Eddy on December 5, 2016

    With the holiday season fast approaching—they’re playing Jingle Bells in the department stores across the land—businesses need to be ready for the periods when IT security staff will be enjoying time with friends and family. The job of the IT pro isn’t likely to get easier anytime soon, and this is especially true during the holidays when employees are out of the office and expect to remain…

  • RSA Conference: Our Most Popular Posts from August 2016

    by Jennifer Lawinski on September 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of August this year? Top Blog Posts 1. Dissed by NIST:…

  • SMS Two-Factor Authentication Is No Longer Enough

    by Alisdair Faulkner on August 26, 2016

    With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging. Businesses must verify who they’re transacting with by implementing additional security measures, but at the same time they need to minimize friction and provide seamless user experiences to avoid losing users to competitors. SMS two-factor…

  • Dissed by NIST

    by Wendy Nather on August 19, 2016

    In the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management—and isn’t that a mouthful, even if you’re reading silently to yourself?—the authors have come out with the following bombshell: Due to the risk that SMS messages may be intercepted or redirected, implementers of new systems SHOULD carefully consider…

  • Cybersecurity: The Quick and the Dead

    by Robert Statica on August 15, 2016

    More than two million people were affected by cyber crime in the UAE last year and not a week goes by without a report of a business having its files hacked or leaked. The UAE, as a global business hub and point of exchange, is particularly vulnerable to attackers from across the world. CEOs and their colleagues in IT and cybersecurity simply can’t afford to wait until they become a victim of an…

  • Mobile Security Vulnerabilities Are Creating Big Problems

    by Sean Cunningham on August 2, 2016

    We hear constantly about devastating cyber attacks on government institutions, corporations and health care providers. Last summer, an attack against the U.S. Office of Personal Management exposed personal information about millions of federal employees. Successful cyber assaults against major American corporations such as Target, Sony and J.P. Morgan Chase also attracted attention. And barely more…

  • iOS Attacks: A Rapidly Evolving Threat Landscape

    by Yair Amit on June 9, 2016

    Early in the adoption of enterprise mobility, iOS was considered the “better” choice. A more stable and consistent operation system was preferable for developing custom apps, and Apple’s iOS operating system was believed to be inherently more secure than Google’s Android due to the controlled app store ecosystem and better app sandboxing mechanisms. Fast forward to today and we see that…

  • RSA Conference Greatest Hits: May 2016

    by Jennifer Lawinski on June 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of May this year? Top Blog Posts 1. Executive Hotel…

  • The Dangers of Skimmers and Safes in Hotel Rooms

    by Dale "Woody" Wooden on June 6, 2016

    This is part two of my series on hotel safety for protecting intellectual property and personal information. We will be starting where my past article “Executive Hotel Rooms Are A Hackers Treasure Chest” ended. You’re in your room and ready for bed. You put your wallet or purse on the nightstand and settle down for sleep. That is where the fun begins. You have heard about RF skimmers—the product…

  • Enterprise Security Concerns for Consumer IoT Devices

    by RSAC Contributor on April 22, 2016

    By Andrew Hay, CISO, DataGravity “What are the security implications of consumer Internet of Things (IoT) devices being introduced into modern business environments and how to you protect your organization as a result?” At RSA 2016 I was able to pose this question to a full room of business executives, IT architects, and security analysts who were responsible for dealing with this very real…

This document was retrieved from https://www.rsaconference.com/blogs on Fri, 09 Dec 2016 21:59:33 -0500.
© 2016 EMC Corporation. All rights reserved.