Friday Five: 4/17 Edition (2015)
Contact Us | |
Free Demo | |
Chat | |
Your Weekly Roundup of information security news.
It’s Friday! With the RSA Security Conference right around the corner, get up to date with some of the latest cybersecurity news with our picks for this week’s hottest articles from the IT and security presses:
- “The 10 Smartest Things to Do at the RSA Conference” by Susanne Gurman
On April 20-24th the highly renowned RSA Security Conference will take place at the Moscone Center in San Francisco, CA. This conference has been continually growing over the years and can be overwhelming for new attendees. To get the most out of your RSA experience check out these 10 tips by Digital Guardian’s Susanne Gurman and catch us at booth 2207! - “Hackers Could Commandeer New Planes Through Passenger Wi-Fi” by Kim Zetter
Modern transportation is becoming more and more computerized. Automobiles, planes, and trains are now being equipped with WiFi systems that are highly desired by passengers, but are also susceptible to hacking. Zetter’s article focuses on Boeing 787 Dreamliner jets as well as Airbus A350 and A380 aircrafts that now have Wi-Fi passenger networks. Read this article to find out about the concerns over the possibility of hijacking the navigation system or commandeering these planes through Wi-Fi networks. - “4 Backup Landmines Waiting For The Unwary” by Ratmir Timashev
Backup is an important preventative measure against permanent data loss. However, backup has been found to be rarely used as a tool to restore lost data. Additionally, there are multiple backup "landmines" that are often overlooked by security teams that put data centers at risk. To learn more about these landmines, check out this article. - “Why Standardized Threat Data Will Help Stop the Next Big Breach” by Bill Nelson
Despite cyber-security becoming a high priority, security professionals still find the digital world unorganized and lacking standardization. With numerous threat intelligence sources, varying formats, and thousands of threat indicators, security professionals must go through a very lengthy process in order to track down threats. In an effort to streamline this process, new standards and protocols are being developed. For more, give this article a read. - “Lottery Winner May Have Won By Hacking, So Who Gets To Keep The Loot?” by Robert W. Wood
Just about everyone who plays the lotto is aware of how slim their chances of winning are. But what if you could guarantee yourself a winning ticket? This is exactly what Eddie Raymond Tipton did when he “won” $14.3 million. Tipton found a way to hack the lottery, and then attempted to launder the money between different people and accounts before being caught. To find out how Tipton carried out this hack, read Wood’s article.
Recommended Resources
The Definitive Guide to DLP
- The seven trends that have made DLP hot again
- How to determine the right approach for your organization
- Making the business case to executives
The Definitive Guide to Data Classification
- Why Data Classification is Foundational
- How to Classify Your Data
- Selling Data Classification to the Business