Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.
In an age of advanced attacks and insider threats, traditional perimeter-based security just doesn't cut it, argue two leading InfoSec experts.
An interesting discussion at the RSA conference revealed that vendors often face a "double-edged sword" when tasked with disclosing software vulnerabilities.
We caught up with attendees of the 2014 RSA Conference in San Francisco to discuss what they're looking forward to from this year's event.
If you have broken no law, nor failed to comply with any agreed industry standard, are you liable for the consequential loss incurred by your clients if you suffer a data breach that causes them loss?
Cryptography expert Bruce Schneier, now CTO of Co3 Systems, continued his criticism of the National Security Agency's surveillance during his well-attended talk at the RSA Conference in San Francisco today.
While he may not be attending the RSA Conference this year in San Francisco, the Information Security Forum's Steve Durbin hopes that there will be an emphasis on discussions that lead to increasing shareholder value.
Security researcher - and white hat hacker - Raven Alder addressed sexism in the InfoSec world at the B-Sides San Francisco event on Monday, and said - perhaps surprisingly - that it can help and hinder attackers and defenders in equal measure.
Hackers and InfoSec experts need to stand up and become part of a wider plan to influence and reform government legislation on information security, so says Rapid 7 global security strategist Trey Ford.
Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.
Richard Clarke kicked off the CSA Summit 2014 by discussing his observations about the NSA surveillance controversy.
Known for his work on car hacking in 2013, Chris Valasek, director of security intelligence at IOActive, will be sharing even more insight on automotive security at the RSA Conference 2014 in San Francisco.
With endless amounts of talks taking place at the end of the month in San Francisco, we caught up with Paul Lipman, CEO of Total Defense, to see what's on his radar for RSA Conference 2014.
There's no shortage of anticipated topics to be covered at the many events taking place in San Francisco at the end of February. In this brief Q&A, Trey Ford, global security strategist at Rapid7, discusses the ones he's most excited about.
In this interview, Nick Rowe, COO of iSEC Partners, discusses the first annual TrustyCon event, what it should be perceived as, as well as what attendees can expect.
Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.
There are plenty of talks to look forward to at the RSA Conference this year in San Francisco. Larry Whiteside, chief security officer, Lynx Technology Partners Inc., shares what he thinks will be some standout topics.
BeyondTrust CEO, Kevin Hickey, will be attending the RSA Conference this year because he believes it gives security enterprises the best chance to drive both business and awareness.
Known for speaking and attending at conferences around the country, Jason Healey hopes that a lot of constructive discussions will come out of the RSA Conference this month in San Francisco.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure