Enter at Your Own Risk: The Perils of Livestreaming Content

There’s no such thing as a free lunch, not even on the Internet. But if you do decide to splurge, new research finds your lack of willpower may come with a side order of malware. In this case, that free lunch actually refers to websites that offer free livestreaming of things like sporting events, concerts, and so on. Turns…

The post Enter at Your Own Risk: The Perils of Livestreaming Content appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Enter at Your Own Risk: The Perils of Livestreaming Content

Great Things Come in 3s – EMC (RSA) Positioned in Leader’s Quadrant in Three Gartner Magic Quadrants

We have all heard the adage that great things come in threes. Stooges. Pigs. Blind Mice. The list goes on and on. I have am very pleased to announce another thrilling combination of three – Gartner Magic Quadrants. EMC (RSA) has been positioned in the leader’s quadrant in three Gartner Magic Quadrants: Operational Risk Management,…

The post Great Things Come in 3s – EMC (RSA) Positioned in Leader’s Quadrant in Three Gartner Magic Quadrants appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Great Things Come in 3s – EMC (RSA) Positioned in Leader’s Quadrant in Three Gartner Magic Quadrants

Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6

Online fraud remains as much a part of digital life as URLs. Fraudsters are constantly devising new ways to separate consumers from their money, login credentials, Personally Identifiable Information (PII), healthcare data and anything else that can be monetized. Even more, they are doing it with speed and sophistication, but most damaging, they do it…

The post Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6 appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6

Privacy and the Smart Grid

Although much of the focus in the SPARKS project, for which I’m the technical director, has been on cybersecurity’s role in minimizing the risks and costs of power disruption, the project has also been concerned with identifying and mitigating risks to privacy that may be entailed by the deployment of Smart Grid.  One of the…

The post Privacy and the Smart Grid appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Privacy and the Smart Grid

Privacy and the Smart Grid

Although much of the focus in the SPARKS project, for which I’m the technical director, has been on cybersecurity’s role in minimizing the risks and costs of power disruption, the project has also been concerned with identifying and mitigating risks to privacy that may be entailed by the deployment of Smart Grid.  One of the…

The post Privacy and the Smart Grid appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Privacy and the Smart Grid

How To Keep An Unruly Dryer In Line

If necessity is the mother of invention, then inconvenience is its frustrating co-conspirator. Faced with a finicky dryer that would shut down mid-cycle with a barely audible beep if its load was uneven (leaving a soggy mass of laundry), [the0ry] decided to add the dryer to the Internet of Things so it could send them an email whenever it shut itself down.

After opening a thinger.io account, adding the soon-to-be device, and setting up the email notification process, [the0ry] combined the ESP8266 Development Board, a photosensitive resistor, and a 5V power supply on a mini breadboard. All that …read more

Continue reading How To Keep An Unruly Dryer In Line

Consumer Security vs. User Experience in a Mobile World

Most people have had to go through the slow, and sometimes frustrating, process of standing in an airport security line at least once in their life. While not convenient for frequent flyers, we understand that although it is time consuming, it is vital to ensure security for people’s lives. However, this is not how customers…

The post Consumer Security vs. User Experience in a Mobile World appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Consumer Security vs. User Experience in a Mobile World

Turn Down the Bed, Turn Down the Lights

Home automation seems to be working its way to a computer-controlled future in which humans will be little more than an afterthought. Eventually they will take over Skynet-style, but until then, we will enjoy the relative comfort that a good home automation project provides. The latest from [Clement] certainly goes a long way towards this goal by automating his bed (Google Translate from French).

With four load cells and a microcontroller, [Clement]’s bed can tell whether or not he is sleeping. After taking a weight reading, the bed can send commands to the rest of his home automation system and …read more

Continue reading Turn Down the Bed, Turn Down the Lights

RSA Via Lifecycle and Governance Named a ‘Leader’ in 2016 Forrester Wave: Identity Management and Governance Report

RSA is happy to announce that RSA Via Lifecycle and Governance has been recognized as a ‘Leader’ in The Forrester Wave™: Identity Management and Governance Q2, 2016 report!  (View and download the report here) Forrester evaluated 9 of the most significant Identity Management and Governance providers across 17 criteria, and recognized RSA Via Lifecycle and…

The post RSA Via Lifecycle and Governance Named a ‘Leader’ in 2016 Forrester Wave: Identity Management and Governance Report appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading RSA Via Lifecycle and Governance Named a ‘Leader’ in 2016 Forrester Wave: Identity Management and Governance Report