The Dyn Attack – How IoT Can Take Down the “Global Information Grid” Back Bone (Part I)

Authored by Nick Murray and Peter Tran Imagine that you are driving through downtown New York City (NYC) and only relying on your GPS for directions. All of a sudden, the GPS stops working and you are stuck in mid-town Manhattan traffic during rush hour. If you have ever tried to drive in NYC, you…

The post The Dyn Attack – How IoT Can Take Down the “Global Information Grid” Back Bone (Part I) appeared first on Speaking of Security – The RSA Blog.

Continue reading The Dyn Attack – How IoT Can Take Down the “Global Information Grid” Back Bone (Part I)

Recognizing and Combating Cybercrime: A Virtual Chat

The goal of cybercrime doesn’t change, but the tactics do.  This week’s theme for National Cyber Security Awareness Month is Recognizing and Combating Cybercrime.  One of the questions to be addressed is: What are cybercriminals looking to gain from attacks? With the impact of cybercrime costing the global economy about $445 billion in 2016, which is more than the market…

The post Recognizing and Combating Cybercrime: A Virtual Chat appeared first on Speaking of Security – The RSA Blog.

Continue reading Recognizing and Combating Cybercrime: A Virtual Chat

Cybersecurity – Let’s Make It A Chick Thing

Time flies when you’re having fun fighting cybercriminals – we are already more than halfway through October and into the third week of Cybersecurity Awareness Month. This week’s theme is Recognizing and Combating Cybercrime, which is quite literally RSA’s raison d’etre. The focus this week is on the collaborative nature of fighting cybercrime as well…

The post Cybersecurity – Let’s Make It A Chick Thing appeared first on Speaking of Security – The RSA Blog.

Continue reading Cybersecurity – Let’s Make It A Chick Thing

Why a Cyber Risk Assessment Is Essential for M&A Due Diligence

According to J.P. Morgan, the global mergers and acquisitions (M&A) market amounted to $5 trillion in 2015 and continues to show strong levels of growth. When it comes to M&A, the due diligence process involves investigating the health of another business before engaging in any sort of transaction. This process will take many factors into account,…

The post Why a Cyber Risk Assessment Is Essential for M&A Due Diligence appeared first on Speaking of Security – The RSA Blog.

Continue reading Why a Cyber Risk Assessment Is Essential for M&A Due Diligence

Identity and Access Management Strategies: IAM Spending to Increase in Europe

Businesses around the world recognize that it’s crucial to take the necessary precautions to verify identities and manage digital credentials when conducting business online. In fact, a recent study by Pierre Audoin Consultants (PAC) found that 93% of 200 polled European businesses claimed that they planned to maintain or increase their identity and access management…

The post Identity and Access Management Strategies: IAM Spending to Increase in Europe appeared first on Speaking of Security – The RSA Blog.

Continue reading Identity and Access Management Strategies: IAM Spending to Increase in Europe

Pulley Lamp Stands Up With You

Standing desks are either the best thing since sliced bread, or the fastest way to make your legs tired and get you ridiculed by your coworkers in the bargain. This leads some folks to compromise and make standing desks that can be re-lowered to sitting height when you need to take a break. But now the distance from your desktop to the light source that illuminates it has changed. We can’t have that!

[John Culbertson] came up with a very elegant solution to the “problem”. He made lights that are suspended on pulleys that raise and lower with the desk …read more

Continue reading Pulley Lamp Stands Up With You

Where Is My Cybersecurity Rosetta Stone?

This week’s theme for National Cyber Security Awareness Month is “Cyber from the Break Room to the Board Room.” Communication, like anything else worth getting better at, takes practice. Sometimes it takes planning to know what we want to say and how we want to say it. We also need to anticipate who our audience is…

The post Where Is My Cybersecurity Rosetta Stone? appeared first on Speaking of Security – The RSA Blog.

Continue reading Where Is My Cybersecurity Rosetta Stone?

Six Steps For Cybercrime Survival

While recently cleaning my grandfather’s attic, I came across an old Federal Civil Defense Administration brochure titled “Six Steps to Survival – If an enemy attacked today would you know what to do?”  In our modern times, many of us are being attacked on a daily basis by cybercriminals. As such, do you know what…

The post Six Steps For Cybercrime Survival appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Steps For Cybercrime Survival