Showing Blog Posts: 1–10 of 18 tagged Social Media

  • How to Strike a Balance Between Disruption and Compliance

    by RSAC Contributor on April 20, 2016

    By Joanna Belbey, Social Media and Compliance Specialist, Actiance Unicorn startups are praised for revolutionizing regulated industries with new technologies, but does disruption come with a cost? When companies, especially those in controlled industries like financial services, healthcare, pharmaceuticals and the public sector, challenge the status quo, they risk facing the consequences of not…

  • The Reality of Our Registration Twitter Promotion

    by Sandra Toms on January 22, 2016

    As some of you may have seen, a social media plug-in to our encrypted Conference registration system had some of our attendees concerned we were collecting Twitter passwords in our databases. RSA Conference 2016 has not and will not collect or store attendee Twitter password information during its Conference registration process. The “Tweet this” functionality on our encrypted registration page…

  • Managing Online Risk: Apps, Mobile, and Social Media Security

    by Ben Rothke on December 1, 2015

    Twitter has ended the careers of many high-profile athletes and politicians. Inappropriate Instagram photos have led to suicides. Negative feedback on Facebook has sent many brands running for cover. While the benefits of social media are significant, so are the risks. Knowing how to deal with those risks in advance can save not just money and reputations, but lives. In Managing Online Risk:…

  • Introduction to Social Media Investigation

    by Ben Rothke on August 28, 2015

    Had you Googled social media investigation a decade ago, you would have gotten a handful of responses. Today, it has become a key part of law enforcement, family law and more. Social media played predominantly in the terrible murder last week of journalists Alison Parker and Adam Ward. Law enforcement poured over the social media profiles of the perpetrator. In Introduction to Social Media…

  • Peers Share Tales of Cyber-Bullying and Revenge Porn in the Workplace

    by RSAC Contributor on June 19, 2015

    Peer-2-Peer sessions bring together like-minded security professionals into small groups to discuss topics important to them. Larry Dietz, general counsel and managing director of information security at TAL Global, facilitated a P2P discussion about cyber-bullying and revenge porn. In this post, Dietz continues the conversation. The Cyber Bullying and Revenge Porn in the Workplace session was…

  • Mining Your Banking Data Gold Mine

    by Dale "Woody" Wooden on May 14, 2015

    Dale "Woody" Wooden illustrates security concepts through stories. His past posts discussed how attackers mine employees' social media accounts for information and how social media can be used against you. This story is about companies asking for way too much information about your business. Would you give up all your itemized bank statements to a third party? Hand over information about…

  • Loose Lips Sink Ships, Part 2

    by Dale "Woody" Wooden on March 26, 2015

    Dale "Woody" Wooden illustrates security concepts through stories. His past posts discussed how attackers mine employees' social media accounts for information. This story picks up where we left off last time. If you read my last post, you already know our four travelers from Company X. They all used social media to discuss the trip to London they went on for the company. A hacking organization…

  • Social Media Security: Leveraging Social Networking While Mitigating Risk

    by Ben Rothke on February 3, 2015

    A firm can spend decades building a brand into one that inspires trust. Unfortunately, social media can quickly destroy that trust in an instant. In Social Media Security: Leveraging Social Networking While Mitigating Risk, author Michael Cross provides a comprehensive overview of the security and privacy risks around social media. The book lives up to its title and effectively shows the reader…

  • Loose Lips Sink Ships (And Profit Margins!)

    by Dale "Woody" Wooden on January 27, 2015

    Dale "Woody" Wooden illustrates security concepts through stories. This story looks at how attackers monitor employee social media accounts. There is also a Part 2. One of the largest threats facing any corporation is the leak of critical information and the ease at which it can be monitored by criminals and terrorists. Few organizations properly train their employees how to protect themselves at…

  • Data Privacy in the Era of Sharing

    by Christopher Burgess on January 1, 2015

    Information is meant to be obtained, consumed, and, above all, shared. Yet we sit today in a new era of data privacy and transperancy, where consumers want to know how and where their information will be used. It doesn't matter if the information aggregation happened with their direct participation or if it was collected wholesale. As we collaborate, share, and enable, we must ensure we do so…

This document was retrieved from on Fri, 28 Oct 2016 04:20:10 -0400.
© 2016 EMC Corporation. All rights reserved.