Hacking the Mr. Robot Season 2 Premier

The psychological thriller Mr. Robot, which airs on the USA Network, is a fan favorite among cybersecurity professionals. What differentiates the show from its predecessors in the cyber-thriller genre is the depth of technical research involved in developing each episode. I’ll plan to dissect each episode from a technical perspective, examining the extent to which…

The post Hacking the Mr. Robot Season 2 Premier appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Hacking the Mr. Robot Season 2 Premier

EMC (RSA) ARCHER NAMED A LEADER IN THE 2016 GARTNER MAGIC QUADRANT FOR BUSINESS CONTINUITY MANAGEMENT PLANNING SOFTWARE

For the third year in a row, RSA Archer has been named a Leader in Gartner’s Magic Quadrant (MQ) for Business Continuity Management Planning Software (BCMP)! Gartner states in their report that the business continuity management (BCM) market is changing because “continuity of operations is being seen by organizations as a growing risk that needs to…

The post EMC (RSA) ARCHER NAMED A LEADER IN THE 2016 GARTNER MAGIC QUADRANT FOR BUSINESS CONTINUITY MANAGEMENT PLANNING SOFTWARE appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading EMC (RSA) ARCHER NAMED A LEADER IN THE 2016 GARTNER MAGIC QUADRANT FOR BUSINESS CONTINUITY MANAGEMENT PLANNING SOFTWARE

A Grounded Option for the Jet-Setting Homebody

Over the course of 10 years, [Bruce Campbell] has built himself a sleek pad out of a Boeing 727-200 in the middle of the picturesque Oregon countryside.

As you’d expect, there are a number of hurdles to setting up a freaking airplane as one’s home in the woods. Foremost among them, [Campbell] paid $100,000 for the aircraft, and a further $100,000 for transportation and installation costs to get it out to his tract of land — that’s a stiff upfront when compared to a down payment on a house and a mortgage. However, [Campbell] asserts that airplanes approaching retirement come …read more

Continue reading A Grounded Option for the Jet-Setting Homebody

Play Pokemon Go? Know the Risks and How to Mitigate Them

Unless your home as been inside of a cave for the past week, you’ve certainly heard of Pokemon Go. Scratch that. Even if you have been living inside of a cave, chances are that someone inadvertently walked entered in hopes of locating Pikachu. While the game has become seemingly ubiquitous, you should be cognizant of…

The post Play Pokemon Go? Know the Risks and How to Mitigate Them appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Play Pokemon Go? Know the Risks and How to Mitigate Them

Hackers Hunt for Healthcare Records

What’s the difference between data theft from a bank account versus a healthcare record? For starters, think of theft from a bank account as the equivalent of a single withdrawal; one and done. Sooner than later it’s discovered, a new account number is issued and, as a hacker, you’re effectively cut off. When it comes…

The post Hackers Hunt for Healthcare Records appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Hackers Hunt for Healthcare Records

Dude, Where Is My Archer Summit?

We have all had that moment walking out of the shopping mall or the airport.  Everyone knows the feeling when that rush of doubt takes hold of our brains.  We stand frozen and frantically wait for our cerebral cortex to do its thing and pluck that single memory out of our vast network of synapses……

The post Dude, Where Is My Archer Summit? appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Dude, Where Is My Archer Summit?

Cyber Scams to Beware of at the 2016 Summer Olympics

Are you planning to cheer on your country’s athletes in-person at the Summer Olympics in Rio and need some discounted tickets? Or maybe you can’t afford to actually travel there, but would love to win a ticket lottery that would increase your chances of doing so? Or maybe you’re not planning to attend at all…

The post Cyber Scams to Beware of at the 2016 Summer Olympics appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Cyber Scams to Beware of at the 2016 Summer Olympics

Part 4: Fundamentals of the Game – There is no intelligence without data

After having identified the set of fundamental skills needed to set up a successful SOC, highlighted the importance of the alignment between SOC and business goals, and  understood how people, processes, and technology must work together for a SOC to be successful, we now investigate the next SOC fundamental skill: focus on data through visibility…

The post Part 4: Fundamentals of the Game – There is no intelligence without data appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Part 4: Fundamentals of the Game – There is no intelligence without data

Cybersecurity’s Poverty Gap

As we pass the halfway point of 2016, the United States Presidential election process is in full swing. Candidates continue to make the case for why their worldview is in the best interests of the nation. Perhaps no other topic polarizes the candidates and receives more prominence in this context than wealth inequality. Within cybersecurity,…

The post Cybersecurity’s Poverty Gap appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Cybersecurity’s Poverty Gap