Menu

Blogs

Showing Blog Posts: 1–10 of 1423

  • Hackers and Threats Abound For GDPR, Emperor Snoke

    by RSAC Editorial Team on May 24, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is the final post of a five-part monthly series we kicked off in January 2018 to take a look at how technology, topics and trends from the cybersecurity world compare to characters and themes from the blockbuster Star Wars films. We hope you enjoy our blog series in which the Resistance, filled with hope and determination, …

  • Proactivity and Speed Have Become Essential Components of Cybersecurity

    by Sean Cunningham on May 22, 2018

    Fundamentally, there are two major reasons why enterprises get breached despite ever-increasing cybersecurity budgets. They are typically related to insufficient proactive intelligent threat analysis and addressing advanced malware as it enters an enterprise computer system or network too slowly. Companies can take up to four months to address critical vulnerabilities and, on average, more than…

  • Resources for the Community: USA Today’s Homeland Security Edition 2018

    by RSAC Editorial Team on May 17, 2018

    Already one-third of the way through 2018 (how did that happen?), many of us are still catching our breath from April in what was a packed month culminating in another great week out in San Francisco at RSA Conference 2018. With so many great discussions taking place last month, we hope all of you were able to take part in the event and come away inspired by our industry, and ready to engage and…

  • Governments Worldwide Appear to Be Hearing the Calls for Improved Cyber Security

    by Tony Kontzer on May 15, 2018

    Governments of all types have long proven to be challenged in the area of cyber security. Forget the long-standing jokes about government red tape and inefficiency; this isn't about not being able to get it done. It's about years of giving security short shrift. Consider that the United Nations' second annual Cyber Security Index released last summer indicated that just 38 percent of the world's…

  • Ben's Book of the Month: Review of "InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe"

    by Ben Rothke on May 14, 2018

    To address the lack of women in cyber security, a new book is out dealing with that in InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Rethink Press 978-1781332696) by Jane Frankland. In this interesting book, she brings to light detail about the lack of women in the information security field, and the importance the future of information requires…

  • Infiltration - Successes and Pitfalls of Penetrating Hostile Online Groups

    by Lance Cottrell on May 11, 2018

    Few security professionals choose to take control back from their opponents by bringing the fight to their doorstep. However, by working to infiltrate their groups, organizations are better equipped to combat fraud, discover new malware, or look for specific threats. In all cases, researchers and analysts need to avoid identification and the associated risk of blocking or reprisals. In the RSAC…

  • Evolving Playbooks in Targeted APT Attacks across Asia Pacific and Japan

    by Vicky Ray on May 10, 2018

    For the past few years, Asia Pacific and Japan have continued to be a regular target of cyber adversaries. At RSA Conference 2017 Asia Pacific & Japan in Singapore, some of the APT attack cases impacting the region were identified. Key reasons for the Asia Pacific & Japan (APJ) to experience high number of targeted attacks include the region’s high economic growth and the decade-long ongoing…

  • Flipping the Script on Cyber Threats from Being the Hunted to the Hunter

    by Chris Dodunski on May 8, 2018

    Data is the new currency and cybercriminals have been incredibly successful at weaponizing tools, techniques and procedures to exploit corporate networks. We have seen this time and time again from Equifax and Home Depot to Uber and Sony PlayStation. These security breaches are not only a considerable expense but also damaging to corporate reputations. In most cases, by the time you react, the…

  • Cross-border Data Flows in Asia: The State of Play

    by Sam Pfeifle on May 3, 2018

    While much of the world is focused on the privacy developments in Europe, where the General Data Protection Regulation is sucking much of the oxygen from the room, Asia has quietly been very busy, indeed, on the privacy front. Hong Kong hosted the most recent privacy commissioners’ conference; the Philippines data protection authority has quickly grown into new voice on the global stage; and…

  • How Increasing the Amount of Data Can Help us Overcome Information Overflow and Score Fatigue

    by Olov Renberg on May 1, 2018

    What can we learn from our mistakes in automation and what’s in store for this trend in the future? In 2017 we saw plenty of attacks using a wide variety of methods, striking hard against the poorly-protected. We’re also seeing increasingly secure systems, with attacks that still manage to keep up. As much as our security has improved and continues to improve in line with increases in computing…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 28 May 2018 01:24:52 -0400.