You Are Here: Home » Security » Malware

Data breach PR: How to survive your worst nightmare

There are two kinds of companies in this world: Those that have experienced a data breach, and those that will at some point in the future. At least that’s how seasoned cybersecurity experts approach risk assessment and mitigation plans. From a public-relations standpoint, once internal – or external – parties discover a data breach, a company’s immediate reaction will set the tone of the reportage. It’s a ...

Read more

Experts Assess Cyber Security Threats in Medical Technology

https://www.youtube.com/watch?v=cqCUehGEq80 As the number of patients using medical devices – worn or implanted – exponentially grows, to what extent is their privacy or safety at risk from hackers? And, how are medical technology manufacturers, security software developers and regulators like the FDA addressing this issue of data breaches? Given the growing prominence of medical technology delivery systems ...

Read more

RSA 2015: Breaking the Glass Firewall: The Changing Role of Women in IT Security

RSA is only days away. The leading security conference features hundreds of sessions, ground-breaking research and discussions about issues facing the industry. One of the more interesting sessions will explore the role of women in the IT security industry. Only 11 percent of people in the IT security profession are women. A lack of mentorship and salary discrepancies are just some of the obstacles impactin ...

Read more

The 2015 RSA Conference Clock Ticks Toward April 20

Are you a marketing or public relations professional responsible for making your executive team look good in front of reporters and industry analysts at the 2015 RSA Conference? Do you have your finger on the pulse of how reporters plan to spend their time at the conference? How many media briefings do you have scheduled for your executives? Whether you have answers to one, two or all three questions, there ...

Read more

Boston InfoSec Event Tackles the Topic of Today’s Targeted Threats

Less than a week since RSA Conference 2014 ended, members of the InfoSec community convened again, this time in Boston at a half-day seminar hosted by InformationWeek and Dark Reading called “Security: Understanding and Preventing Today’s Targeted Threats.” Some of the industry’s best-known personalities were on hand to discuss the latest attack trends, the motivations, methods and tools behind them, and ho ...

Read more

MSLGROUP IT Security Pros at RSA Conference 2014

Over 20 members of MSLGROUP's tech team have been on the ground in San Fran at RSA Conference 2014 for our IT security practice, with many others providing support from the home-base. Those who are in attendance at RSA took a quick break during the show to snap a team photo. From left to right: Iris Herrera Whitney, David Sikorski, Kelly Doyle, Anna Parker, Anne Lundregan, Isaac Steinmetz, Lesley Sullivan,  ...

Read more

RSA Day 5

Everywhere you turn, someone is using his or her smartphone. Whether you’re addicted to your BlackBerry or you can’t live without your iPhone, smartphones are taking over the mobile world. Browsing through mobile applications has become part of the smartphone culture; we look for an app that will make doing XYZ a little easier in our lives. However, unsuspecting consumers need to realize that mo ...

Read more

RSA 2011: Day 2

Yesterday there was a lot of interest in the Cloud Security Alliance Summit, especially since cloud security is still an unresolved security topic. Just take a look at this line waiting to get in!The big news that came from this session surrounded the government’s plans to spend $20 billion on cloud security, at least according to the 2012 budget. Also from this discussion, there were four key areas i ...

Read more

Black Hat 2010 Sessions – Day 1

Today is the first day of the 2010 Black Hat Conference speaking sessions. Among the line-up of anticipated talks surrounding wireless security (specifically that of WPA2), mobile device security and ATM vulnerabilities, there is a slew of additional sessions that are bound to make some noise.One of the noise makers is likely to be the session exploring how to intercept cell phone calls. Some interesting ru ...

Read more

Black Hat – Preparing for the Sessions

This year's Black Hat conference is considered to be the most popular to date, and tomorrow marks the first of two days of speaking sessions. For those of you who participated in the Black Hat Challenge, you are aware that there are many sessions to choose from, and little time to see them all.One of the most anticipated sessions is the Barnaby Jack ATM scams, which was mentioned in yesterday’s post. ...

Read more

Schwartz Security PR Team Wins SABRE Award

May is treating the Schwartz security team well. Last week, we were recognized with a SABRE Award in "Research for Publicity" for our work in "Research for Publicity" on behalf of Javelin Strategy & Research. Schwartz and Javelin combined professional and social media to promote Javelin's annual identity fraud report, increasing media coverage 126 over previous years, and a whopping ...

Read more

Infosec Here We Come

After months of planning, Infosec is nearly here. The three-day event, taking place on 28-30 April in London, is the largest security conference in Europe and attracts more than 12,000 visitors and 300 journalists. We've seen several London-area trade shows cancelled recently in the wake of slashed marketing spend, yet Infosec organisers have moved the show to a bigger conference hall this year--Earls Court ...

Read more