Menu

Blogs

Showing Blog Posts: 1–10 of 16 tagged Ransomware

  • History is Repeating Itself (In a Good Way)

    by Feris Rifai on January 17, 2017

    History is repeating itself. Before Sarbanes Oxley passed in 2002, having a director that was a financial expert in the American corporate boardroom was not the norm. In fact, CFOs who were originally thought of as financial gatekeepers are more than ever before held accountable for the integrity, accuracy and traceability of the financial information presented to the board. Today, we all know…

  • Ransomware: Defending Against Digital Extortion

    by Ben Rothke on January 11, 2017

    As an early piece of malware, the 1989 Yankee Doodle virus was limited to playing the patriotic song of the same name. Much has changed over the years, and the rise of ransomware is playing out a very, and much less melodious tone. Countless individuals and businesses of all sizes are being locked out of their own data and their systems made unavailable, until a ransom is paid to the ransomware…

  • RSAC 2017 Ransomware Summit

    by Andrew Hay on January 9, 2017

    Nobody likes to think about their company’s critical data being compromised and held for ransom. Unfortunately, this type of threat, dubbed ransomware, cannot be ignored. In the first quarter of 2016 alone, CNN projected that cybercriminals collected more than $200 million through ransomware attacks. This would make ransomware a nearly $1 billion business annually, and it is growing quickly. This…

  • Ransomware Unbound: Critical Knowledge for a Growing Threat

    by Nathan Eddy on December 12, 2016

    Ransomware is the most pervasive form of malware out there, as attackers have shifted their focus away from more traditional attacks, and the number of new strains of ransomware continues to grow exponentially. Using ransomware, the criminal takes control of a user’s laptop and data and requires payment to get the control back, and tries to price the crime at a high enough value that it is worth…

  • RSAC 2017 Speaker Submissions Parallel Industry Predictions and Real-World Events

    by Britta Glade on November 17, 2016

    This year has been the year of extortions and, more than ever before, conversations around cybersecurity are more mainstream with increased media coverage of everything from major enterprise hacks to dinner table discussions around the upcoming election and privacy. And with cyber-criminals collecting $209 million in just the first three months of 2016, we have seen an increase in overall consumer…

  • Ransomware, IoT, Blockchain (and More!): What You’ll See at RSA Conference 2017

    by Britta Glade on November 15, 2016

    With more than three months to go before we welcome you to San Francisco, RSA Conference 2017 is already breaking records. We had more submissions for regular session talks this year than ever before—almost 30 percent more! Let that sink in for a minute. We had almost 500 more submissions than our previous record high. And they weren’t submitted by zombie IoT devices or artificial intelligence…

  • Deception, Smart Cities, Ransomware on the Program at RSA Conference 2016 Abu Dhabi

    by Britta Glade on August 18, 2016

    RSA Conference 2016 Abu Dhabi is just a few short months away. Our agenda has been carefully selected by an amazing committee of regional experts, achieving a very interesting balance of sessions designed to address issues that are front and center for our attendees from the area. The RSA Conferences outside of the U.S. (Abu Dhabi and Asia Pacific & Japan, which just concluded in Singapore) provide…

  • RSA Conference Greatest Hits: July 2016

    by Jennifer Lawinski on August 8, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of July this year? Top Blog Posts 1. The Dangers of…

  • Dark Web Globetrotters: A Look at Underground Markets Around the World

    by Jennifer Lawinski on July 25, 2016

    How do cybercriminals operate in the world’s underground markets? Each country has its own distinct markets and own flavor, according to Ryan R. Flores, senior threat research manager at Trend Micro. In his session at RSA Conference APJ 2016 in Singapore, Flores discussed the ways the world’s largest underground markets function, revealing the ways hackers make money off of the data they steal. …

  • Plan, Pray, or Pay: What to Do After a Ransomware Attack

    by Ryan Berg on June 14, 2016

    If you’re not planning, then you’re praying. And praying doesn’t lower your odds of having to pay when ransomware hits. In the immediate aftermath of a ransomware attack—once you get past the initial confusion and shock—you’re likely to find the limited options available to you were determined by choices you made (or didn’t make) weeks and months ago. Yes, there are things you can do to try to…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 24 Jan 2017 20:21:14 -0500.
© 2017 EMC Corporation. All rights reserved.