Menu

Blogs

Showing Blog Posts: 1–10 of 32 tagged Mobile

  • iOS Attacks: A Rapidly Evolving Threat Landscape

    by Yair Amit on June 9, 2016

    Early in the adoption of enterprise mobility, iOS was considered the “better” choice. A more stable and consistent operation system was preferable for developing custom apps, and Apple’s iOS operating system was believed to be inherently more secure than Google’s Android due to the controlled app store ecosystem and better app sandboxing mechanisms. Fast forward to today and we see that…

  • RSA Conference Greatest Hits: May 2016

    by Jennifer Lawinski on June 7, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of May this year? Top Blog Posts 1. Executive Hotel…

  • The Dangers of Skimmers and Safes in Hotel Rooms

    by Dale "Woody" Wooden on June 6, 2016

    This is part two of my series on hotel safety for protecting intellectual property and personal information. We will be starting where my past article “Executive Hotel Rooms Are A Hackers Treasure Chest” ended. You’re in your room and ready for bed. You put your wallet or purse on the nightstand and settle down for sleep. That is where the fun begins. You have heard about RF skimmers—the product…

  • Enterprise Security Concerns for Consumer IoT Devices

    by RSAC Contributor on April 22, 2016

    By Andrew Hay, CISO, DataGravity “What are the security implications of consumer Internet of Things (IoT) devices being introduced into modern business environments and how to you protect your organization as a result?” At RSA 2016 I was able to pose this question to a full room of business executives, IT architects, and security analysts who were responsible for dealing with this very real…

  • How to Use Anonymized Global Digital Identities to Fight Cybercrime

    by Alisdair Faulkner on April 8, 2016

    At the 2016 RSA Conference, there was a lot of buzz surrounding the importance of global threat intelligence sharing. In fact, of the more than 500 exhibitors at the annual conference, 79 companies include threat intelligence sharing as part of their business model. However, such information sharing only works when done right—in an anonymized way that takes into account each user’s full digital…

  • RSAC 2016 Keynote Speakers Talk Apple, Encryption and the FBI

    by Tony Kontzer on March 1, 2016

    It's official: The information security community is firmly behind Apple in its battle with the FBI over the fate of the infamous iPhone 5 belonging to one of the shooters in last year's terrorist attack in San Bernardino, Calif. A succession of keynote speakers Tuesday at the RSA Conference in San Francisco made their allegiances clear, agreeing with Apple's perspective that developing a…

  • Protecting Against the Top Mobile Security Threats in 2016

    by Alisdair Faulkner on February 10, 2016

    By the end of 2016 there will be an estimated 6.4 billion connected devices—a 30 percent increase over 2015—as mobile continues to become the channel-of-choice for everything from online banking to e-commerce. This mobile proliferation is attracting cybercriminals too, and they use stolen identities and compromised devices from major data breaches for advantageous financial gain. Given the…

  • Vulnerabilities for OS X and iOS Take the Spotlight in 2015

    by RSAC Contributor on December 29, 2015

    This post comes from Liviu Arsene, security analyst at Bitdefender. The common belief that Apple’s OS X and iOS are not as prone to vulnerabilities and attacks as other popular operating systems has been put to the test in 2015. As OS X and iOS adoption increases in the enterprise segment—partly due to a new generation of “millennial” managers—attackers will likely target the two platforms more. …

  • Taking Stock: Ranking the Next Billion-Dollar CyberSecurity Markets

    by RSAC Contributor on October 14, 2015

    This post in our VC-series comes from Venky Ganesan, managing director and cybersecurity investor of Menlo Ventures. With IT security spending estimated to crest the $75 billion annual mark before the end of 2015, there’s no shortage of emerging security sectors that will soon cross $1 billion in annual revenues. At the same time, with so many startups pursuing cybersecurity solutions, venture…

  • RSA Conference Asia Pacific Japan Friday Preview

    by Fahmida Y. Rashid on July 24, 2015

    There are 28 sessions to choose from on the final day of RSA Conference Asia Pacific & Japan 2015. While the first day of sessions offered a lot of region-specific content, the second is more general. Instead of being region-specific, the sessions are more strategic, providing insights on specific topics. Mobile payments is a popular topic, but it is a concept with a lot of traction in Asia. Many…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Thu, 28 Jul 2016 23:59:58 -0400.
© 2016 EMC Corporation. All rights reserved.