RSA Conference
RSA Conference
Blog Post
  • One of the challenges of working for the NSA, is that employees don’t have the freedom to share what they do with the professional community at large. Whether it is blogging, writing articles, participating in industry meetings or the like, NSA employees simply can’t do that. It’s not just the NSA, it pretty much every security agency of most countries. While many people think that public-key cryp...

RSA Conference
RSA Conference
Blog Post
  • 2017 saw some of the most sensational and devastating cyber attacks in history. From the Equifax breach, widely regarded as the most damaging breach of all time, to the WannaCry epidemic that wreaked havoc on British National Health Service hospitals, hackers diversified their tactics and created new tools that ended up devastating whole industries. The question for the average user is: What lesso...

RSA Conference
RSA Conference
Blog Post
  • The New Year brings both an opportunity for reflection and for anticipation of what’s to come in the year ahead. While ground breaking technology innovation continues to change how we work, live and connect to the world around us, we also see increased cyberattacks and damaging data breaches. In fact, cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015 accordin...

RSA Conference
RSA Conference
Blog Post
  • *Warning this post or embedded links may contain spoilers* Note: This is part one of a five-part monthly series to kick off 2018 in which we take a look at characters from Star Wars Episode VIII: The Last Jedi and how technology, topics, and trends from the cybersecurity world compare to characters and themes from the blockbuster film. We hope you enjoy our blog series as the Rebellion, filled w...

RSA Conference
RSA Conference
Blog Post
  • Oscars? Grammys? SAG Awards? Golden Globes? Nope. It’s time for awards season on the world’s biggest cybersecurity stage – the 2018 RSA Conference Awards are now open and accepting submissions. Here’s everything you need to know, including a brand-new piece of hardware for 2018: What’s new for 2018? Excellence in Humanitarian Service Award Humanitarian efforts across the globe are growing exponent...

RSA Conference
RSA Conference
Blog Post
  • As 2017 closes, this month’s theme is hackers and threats. We focus on the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these growing information security problems. When it comes to learning the ins and outs of hacking, the various editions of Hacking Exposed are a great resource. The assorted ti...

RSA Conference
RSA Conference
Blog Post
  • As the world looks forward to saying goodbye to the crazy year that was 2017, security experts are chiming in about what to expect in 2018, and the news is not good: insider attacks, tax scams, election hacks, and holes created by the Internet of Things lead the list of threats that cyber security teams can expect to be most prominent in the coming year. Probably not the Christmas gift list they h...

RSA Conference
RSA Conference
Blog Post
  • Numerous relatively recent cyber attacks have successfully breached organizations that should be the cyber world’s equivalent of Fort Knox – exceedingly hard to penetrate. Yet as the infiltration of systems at the likes of the Security and Exchange Commission, National Security Agency and credit bureau giant Equifax underscore, no entity is immune from hackers. Why is this so, even as cyber defens...

RSA Conference
RSA Conference
Blog Post
  • The news covers a major breach seemingly daily. What quickly becomes apparent from these breaches, is that attackers are more likely to draw upon a common arsenal of attacks rather than create a new zero day. In fact, while the victims and the damage vary widely, at the core of attacks are many identical, tried-and-true, tools and techniques. Malware developers, just like software developers, reus...

RSA Conference
RSA Conference
Blog Post
  • One thing we can all be sure of this holiday season: Lots of Americans are choosing to avoid the insanity in shopping malls by firing up their computers, phones and tablets to take care of their Christmas shopping online instead. Even though a steady flow of large-scale data breaches have hit American companies in recent months (hello, Equifax, Whole Foods and Uber, just to throw out a few promine...

RSA Conference
RSA Conference
Blog Post
  • Forecasts call for double digit growth in eCommerce holiday spending. Much like the Dr. Seuss novel, there is a Grinch lurking this holiday season, trying to ruin this joyous time of year. The Grinch, in this case, is the collection of fraudsters working to perform Account Takeover (ATO) attacks. ATO attacks continue to be a growing threat on the Web, targeting any site with a login protecting val...

RSA Conference
RSA Conference
Blog Post
  • Based on the RSA Conference 2018 submissions, we are at an interesting time in the security field and are primed for a fantastic event in April. We have major new policies and regulations looming globally. DevOps, automation, and machine learning have taken hold (by the good guys and the bad ones). Identity—and patching!—is once again sexy. IoT isn’t slowing down, and ICS and supply chain attacks ...

RSA Conference
RSA Conference
Blog Post
  • The New Year brings both an opportunity for reflection and for anticipation of what’s to come in the year ahead. While ground breaking technology innovation continues to change how we work, live and connect to the world around us, we also see increased cyberattacks and damaging data breaches. In fact, cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015 accordin...

RSA Conference
RSA Conference
Blog Post
  • Philosopher Alfred North Whitehead noted that modern philosophy is simply a series of footnotes to Plato. When it comes to cryptography, much of it is simply footnotes to Bruce Schneier’s classic work Applied Cryptography: Protocols, Algorithms and Source Code in C. In Serious Cryptography: A Practical Introduction to Modern Encryption (No Starch Press 978-1593278267), Jean-Philippe Aumasson has w...

RSA Conference
RSA Conference
Blog Post
  • The speed of business is constantly increasing. To keep up, organizations have started to develop and release new products, websites, and apps at breakneck speeds. This quickened pace has shifted the way web applications are developed. Development software now needs to seamlessly integrate into other tools, so there are more APIs, and because we want to release apps faster, we’ve moved to a micro-...

RSA Conference
RSA Conference
Blog Post
  • The holiday season has officially begun, but for many retailers those visions of dancing sugarplums have given way to nightmares about cyberattacks. The ThreatMetrix Q3 2017 Cybercrime Report predicts that the number of ecommerce attacks in the last quarter of 2017 will be greater than the number of attacks across all industries in the same quarter last year, with more than 50 million attacks duri...

RSA Conference
RSA Conference
Blog Post
  • This month’s theme is security strategy & operations. Some questions include: what makes a good cybersecurity strategy? What policies and procedures should you have in place to ensure your employees, customers and sensitive data remain safe? If you believe John Trinckes in How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Auerbach Publications 978-1498783958), the ...

RSA Conference
RSA Conference
Blog Post
  • It's time for today's cybersecurity awareness test: What industry has accounted for 2 percent of all data breaches during 2017, more than healthcare, social media or retail? Finance would be a good guess, but it would be skewed by the scale of the Equifax breach. Government would make sense, too, given that the IRS was breached earlier this year and the SEC in September revealed a substantial brea...

RSA Conference
RSA Conference
Blog Post
  • Throughout my career, I have seen first-hand the real world impacts that a breach in cyber security can have on customers, businesses and communities. With cyberattacks growing in number and sophistication, today security is a requirement of "doing business", however, many companies and organizations lack the knowledge and resources to secure their platforms, products and solutions. For example, S...

RSA Conference
RSA Conference
Blog Post
  • One of the big trends sweeping the IT world is the embracing of DevOps. But, as attendees at the recent DevOps Enterprise Summit in San Francisco were reminded, a DevOps strategy ultimately is only as strong as the security wrapped around it. Look at it this way: The point of DevOps is to get an organization's software development and operations teams on the same page to speed up the development p...

RSA Conference
RSA Conference
Blog Post
  • What makes for a good cyber security strategy? There are all sorts of directions we could take this discussion. For instance, do you handle security issues in a reactive or proactive manner? Do you become unnecessarily preoccupied by the possible threat posed by the sharks in the ocean? Or better still, on how you will deal with all of the potential eventualities that could spring forth from that ...

RSA Conference
RSA Conference
Blog Post
  • A recurring complaint of many executives when berating their CISO, is that they’ve spent exorbitant amounts on information security and often don’t have a lot to show for it. In Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Auerbach Publications 978-1138197893) author Bark Engel shows how these executives are at times correct. Engel has been in the information securit...

RSA Conference
RSA Conference
Blog Post
  • Timely advice about creating a worthwhile corporate cybersecurity strategy sagely starts today by realizing that establishing firewalls and relying on the IT department to monitor attacks isn’t sufficient. Reactive strategies break down over time, making proactive strategies crucial. Further, defensive strategies work only within centralized, controlled and managed-device networks – all now totter...

RSA Conference
RSA Conference
Blog Post
  • Let’s face it. Most of us have some sort of dependence on Excel and PowerPoint. They serve as our centerpiece for aggregating data and building corporate presentations. However, when it comes to cyber security, neither one should be involved. They slow down the process, leave too much leeway for data “massaging” and create inconsistencies up, down and across the organization. Yet surprisingly, at ...

RSA Conference
RSA Conference
Blog Post
  • About ten years ago, I listened to John Thompson, then the CEO of Symantec and now Chairman of the Board for Microsoft, deliver his keynote at the RSA Conference in San Francisco. While I don’t remember many details of his talk, one quote stood out. In making a comparison to cybersecurity, he said, “You don’t buy brakes to stop. You buy brakes to go fast.” After all, if you drove your car at a few...

RSA Conference
RSA Conference
Blog Post
  • It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA...

RSA Conference
RSA Conference
Blog Post
  • It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA...

RSA Conference
RSA Conference
Blog Post
  • The massive 2003 power outage that left more than 50 million Americans and Canadians in the dark may have been a harbinger of things to come. The outage served as a sort of dress rehearsal for what happens when a major chunk of the power grid is rendered useless, and the fact that it was caused by a programming error in the distributor's alarm system should still make us very nervous. Some 14 year...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.