fbpx

Tag Index  /  Showing 1 - 3 of 3 results for “RSA Security”

Security & Privacy

Legislation a Top Priority in Cybersecurity Fight Says RSA’s Coviello

Cybersecurity expert and RSA executive chairman Art Coviello says it's crucial for privacy advocates and industry leaders to come together to create modern laws to protect society from cybercrime. But the Cyber Intelligence Sharing and Protection Act, also known as CISPA and the Rogers-Ruppersberger Bill, was introduced in Congress in 2011. And while the House of Representatives has passed it twice, the bill still languishes in the Senate. In part two of a conversation recorded at Techonomy's recent Data Security Lab, Coviello talks about the responsibilities both of the government and of private companies that have suffered security breaches.   More

Security & Privacy

Is There a Hacker Hiding in Your Air Conditioner?

Hackers will try any point of entry they can find to access private data. In a recent interview with Techonomy, RSA Security’s Art Coviello said that the number of vulnerable access points—or what he calls the “attack surface”—is growing rapidly, with the number of digitally controlled devices connected to the Internet expected to reach 200 billion by the end of this decade. The New York Times reports that hackers recently breached the computer networks of a large oil company by implanting malware in the online menu of a Chinese restaurant favored by the company’s employees. With increasingly sophisticated hackers targeting a proliferating volume of corporate data, our pervasive connectivity—through everything from heating and cooling systems to accounting software and even vending machines—presents a constant challenge to security experts.   More

Learning Partner Insights Security & Privacy

Educating IT Security Soldiers for a Virtual Cold War

On a new global battlefield, countries, criminals, and commercial competitors can effectively leverage technology to steal from or attack target organizations. Corporate intellectual property is at risk of breach as most everyone seeks to gain advantage in the innovation race. Military and government information faces the same risks with consequences for national security, digitized assets, and international affairs. The most dangerous hackers are no longer solitary, discontented teenagers working from their basement bedrooms, but instead are highly skilled professionals employed by corporate offices or military bases.   More