Menu

Blogs

Showing Blog Posts: 1–10 of 1361

  • Keeping Retail Secure in the Digital Age

    by Shimrit Tzur-David on January 16, 2018

    2017 saw some of the most sensational and devastating cyber attacks in history. From the Equifax breach, widely regarded as the most damaging breach of all time, to the WannaCry epidemic that wreaked havoc on British National Health Service hospitals, hackers diversified their tactics and created new tools that ended up devastating whole industries. The question for the average user is: What…

  • What Do Star Wars’ Kylo Ren and Data Privacy Have in Common?

    by RSAC Editorial Team on January 10, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is part one of a five-part monthly series to kick off 2018 in which we take a look at characters from Star Wars Episode VIII: The Last Jedi and how technology, topics, and trends from the cybersecurity world compare to characters and themes from the blockbuster film. We hope you enjoy our blog series as the Rebellion, …

  • RSA Conference 2018 Ready to Roll Out the Red Carpet for Awards Season

    by RSAC Editorial Team on January 4, 2018

    Oscars? Grammys? SAG Awards? Golden Globes? Nope. It’s time for awards season on the world’s biggest cybersecurity stage – the 2018 RSA Conference Awards are now open and accepting submissions. Here’s everything you need to know, including a brand-new piece of hardware for 2018: What’s new for 2018? Excellence in Humanitarian Service Award Humanitarian efforts across the globe are growing…

  • Ben's Book of the Month: Review of "Hacking the Hacker: Learn From the Experts Who Take Down Hackers"

    by Ben Rothke on December 29, 2017

    As 2017 closes, this month’s theme is hackers and threats. We focus on the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these growing information security problems. When it comes to learning the ins and outs of hacking, the various editions of Hacking Exposed are a great resource. The assorted…

  • From the IoT to Insider Threats, 2018 Figures to Keep Security Leaders on Their Toes

    by Tony Kontzer on December 28, 2017

    As the world looks forward to saying goodbye to the crazy year that was 2017, security experts are chiming in about what to expect in 2018, and the news is not good: insider attacks, tax scams, election hacks, and holes created by the Internet of Things lead the list of threats that cyber security teams can expect to be most prominent in the coming year. Probably not the Christmas gift list they…

  • How Enterprises Can Better Combat Advanced Cyber Attacks

    by Sean Cunningham on December 27, 2017

    Numerous relatively recent cyber attacks have successfully breached organizations that should be the cyber world’s equivalent of Fort Knox – exceedingly hard to penetrate. Yet as the infiltration of systems at the likes of the Security and Exchange Commission, National Security Agency and credit bureau giant Equifax underscore, no entity is immune from hackers. Why is this so, even as cyber…

  • Cyber-Game Theory: Focusing on Zero Sum, Not Zero Day

    by Danelle Au on December 22, 2017

    The news covers a major breach seemingly daily. What quickly becomes apparent from these breaches, is that attackers are more likely to draw upon a common arsenal of attacks rather than create a new zero day. In fact, while the victims and the damage vary widely, at the core of attacks are many identical, tried-and-true, tools and techniques. Malware developers, just like software developers, …

  • Shoring Up Online Retail Security Can Ensure A Merry E-Christmas For All

    by Tony Kontzer on December 20, 2017

    One thing we can all be sure of this holiday season: Lots of Americans are choosing to avoid the insanity in shopping malls by firing up their computers, phones and tablets to take care of their Christmas shopping online instead. Even though a steady flow of large-scale data breaches have hit American companies in recent months (hello, Equifax, Whole Foods and Uber, just to throw out a few…

  • Credential Stuffing Threats Facing the eCommerce Industry This Holiday Season

    by Patrick Sullivan on December 19, 2017

    Forecasts call for double digit growth in eCommerce holiday spending. Much like the Dr. Seuss novel, there is a Grinch lurking this holiday season, trying to ruin this joyous time of year. The Grinch, in this case, is the collection of fraudsters working to perform Account Takeover (ATO) attacks. ATO attacks continue to be a growing threat on the Web, targeting any site with a login protecting…

  • RSAC 2018: AI, Blockchain, IoT, GDPR, and More Dominate Submissions

    by Britta Glade on December 18, 2017

    Based on the RSA Conference 2018 submissions, we are at an interesting time in the security field and are primed for a fantastic event in April. We have major new policies and regulations looming globally. DevOps, automation, and machine learning have taken hold (by the good guys and the bad ones). Identity—and patching!—is once again sexy. IoT isn’t slowing down, and ICS and supply chain attacks…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 18 Jan 2018 03:02:28 -0500.