Showing Blog Posts: 1–10 of 162 tagged Security

  • Internet of Things: It’s Not Just the Devices!

    by Ed Skoudis on October 24, 2016

    With the holiday season around the corner, families are about to introduce a new raft of high-tech, Internet-connected gadgets into their homes worldwide. At the same time, enterprises are increasingly deploying automated building control systems and lighting technologies. Local governments are also getting in on the act as the move toward smart cities gathers steam. These advancements represent…

  • We Have Entered the New Cyber Reality, But Are We Ready?

    by Chenxi Wang on October 12, 2016

    During the U.S. presidential debate on September 26, the moderator asked the two candidates to address the following topic: Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it? The very fact that this topic has moved beyond IT whiteboards and corporate boardrooms and into the national Situation Room indicates that we…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • The Longevity Challenge in Infosec

    by Wendy Nather on October 4, 2016

    In a recent BankInfoSecurity article, U.S. Federal Chief Information Officer Tony Scott was quoted as saying one of the main factors behind the OPM breach was the tendency of Congress to “fund civilian agencies to maintain their information systems, not to modernize them.” This is endemic both in the public sector and in other organizations below the security poverty line, which I started writing…

  • Embracing the Power of Opportunity During Cyber Security Awareness Month: Stop. Think. Connect.

    by Sandra Toms on October 3, 2016

    October marks National Cyber Security Awareness Month: a great opportunity for all of us to take a moment to think about how we are protecting ourselves in this increasingly connected world. This reminder applies to everyone: from the CISO, to the college student interested in exploring a career in the security industry, to the mom curious how to bridge a conversation with her children about…

  • National Cyber Security Awareness Month: Staying Safe Online

    by Jennifer Lawinski on September 30, 2016

    This October, as we kick off National Cyber Security Awareness Month, cybersecurity is at the forefront of the national conversation, and staying safe online is more challenging and more important than ever before. With news breaking regularly on hacks that affect millions of people, like the recent revelation that 500 million user accounts at Yahoo! had been breached, it can be confusing to know…

  • Why News Outlets Continue to Be Prime Hacker Targets

    by Rook Security on September 14, 2016

    By Mike Patterson is Vice President of Strategy, Rook Security Arriving on the heels of recent attacks against the Democratic National Committee, news broke that the New York Times and other news organizations were allegedly targeted by hackers. Whether or not you believe outside interference in our election cycle is a result of Russian hackers or another alleged group, given the surge in breach…

  • Cybersecurity Conventions: A Newcomer's Perspective

    by Dale "Woody" Wooden on August 31, 2016

    First, let me start by saying yes, I will be doing a follow-up to RFID blocking wallets. I’m still testing this material and only had one manufacturer who sent me equipment for the Pepsi Challenge. (You can send inquiries to But let me talk now about cybersecurtiy conferences. This year was my first attending one cybersecurity event and my second at another. I’m…

  • A Few Thoughts on Automating Security to Improve Effectiveness

    by RSAC Contributor on August 29, 2016

    By Bret Hartman, Vice President and CTO, Cisco Security Business Group During RSA 2016, I led a Peer2Peer discussion titled Is Automation the Answer for Security in the Digital World? My goal for this session was to gain insight regarding different ways the automation of security operations might improve defenses—as well as the benefits, risks and limitations of those approaches. A number of…

  • Good Security Belongs in the Background

    by Rook Security on August 4, 2016

    By Mike Patterson You may have read that Jason Bourne took the #1 spot at the domestic box office last weekend, with $60 million in ticket sales—one of the better debuts of the summer. That translates into approximately 6 million people seeing the movie, and probably less than a dozen noticed the minor role Rook Security and I played in the fictitious Exocon show at the Aria in the second half of…

This document was retrieved from on Mon, 24 Oct 2016 23:10:26 -0400.
© 2016 EMC Corporation. All rights reserved.