The security community will vy for up to $300,000 in prize money as part of Cisco's Internet of Things Security Grand Challenge,
The needs of the organizations we protect are complex and the response required due to the criticality of the services we provide tends to put our multi-faceted operations in a state of flux, says Roland Cloutier, CSO, ADP.
The entire organization needs to support security initiatives, says Forrest Smith, CISO, Nissan Americas.
Cloud computing is becoming a reality that will need to be addressed by every security department.
John Gibson discusses the challenges and rewards of his security role at tTech Ltd. as the senior IT security officer.
Although industry pros are anticipating security incidents at their organizations, a recent report indicates that their computer incident response teams aren't fit to address them.
While he may not be attending the RSA Conference this year in San Francisco, the Information Security Forum's Steve Durbin hopes that there will be an emphasis on discussions that lead to increasing shareholder value.
Known for his work on car hacking in 2013, Chris Valasek, director of security intelligence at IOActive, will be sharing even more insight on automotive security at the RSA Conference 2014 in San Francisco.
With endless amounts of talks taking place at the end of the month in San Francisco, we caught up with Paul Lipman, CEO of Total Defense, to see what's on his radar for RSA Conference 2014.
There's no shortage of anticipated topics to be covered at the many events taking place in San Francisco at the end of February. In this brief Q&A, Trey Ford, global security strategist at Rapid7, discusses the ones he's most excited about.
In this interview, Nick Rowe, COO of iSEC Partners, discusses the first annual TrustyCon event, what it should be perceived as, as well as what attendees can expect.
Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.
There are plenty of talks to look forward to at the RSA Conference this year in San Francisco. Larry Whiteside, chief security officer, Lynx Technology Partners Inc., shares what he thinks will be some standout topics.
BeyondTrust CEO, Kevin Hickey, will be attending the RSA Conference this year because he believes it gives security enterprises the best chance to drive both business and awareness.
Known for speaking and attending at conferences around the country, Jason Healey hopes that a lot of constructive discussions will come out of the RSA Conference this month in San Francisco.
Tenable Network Security's Jack Daniel discusses Security B-Sides in San Francisco this year, as well as some topics he thinks will be prevalent at the event, in addition to RSA and TrustyCon.
There's no denying that social engineering plays a big part in a majority of attack today, and Chris Hadnagy, chief human hacker at Social-Engineer, Inc., hopes it a big topic at the upcoming RSA Conference.
When the RSA Conference rolls around, it's a time for many industry professionals to finally catch up face to face on a lot of issues they typically communicate on via phone or email. That's what Avivah Shah, vice president and distinguished analyst at Gartner, looks forward to.
While there has been some controversy revolving around a supposed secret NSA/RSA contract, Aviv Raff, CTO at Seculert, doesn't feel it will have a major impact on this year's RSA Conference because the show doesn't have much to do with the company.
For those of us tasked with managing the security of the digital world for the enterprise, there are serious ramifications to this evolution of identity. Specifically, how we manage identity must evolve.
The need for cyber threat intelligence sharing is still vital, and with Congress sidelined, it's going to take leadership from the nation's corporate executives to make progress on this issue within the framework of our current laws.
In a recent study, the Ponemon Institute found 86 percent of companies feel incident response is hampered by lengthy detection process and lack of prioritization.
Students in Georgia were given iPads, but a firewall was impeding network connections...until a solution was found, reports Greg Masters.
In this video, Mike Potts, President and CEO of Lancope, sits with SC Magazine reporter Adam Greenberg to discuss how entities should approach security in 2014.
The cyber threat landscape has always been in flux and will continue to evolve. However, it seems the pace of change has increased significantly in the past few years alone.
Anyone designing a new system such as this should take security into account from the beginning. The amount of personal information that could be harvested by any breach is truly alarming.
From Adobe to Facebook, security breaches continue to be top-of-mind for both companies and users, and organizations around the globe are all wondering if they are next in line to deal with a breach of their own.
In this month's debate, experts discuss whether more guidance on security career opportunities for youths will alleviate the skills gap.
The increasing number of breaches continues to create awareness at enterprises that are increasingly bulking up their security programs.
Converging trends have fused application and network layer functions, causing a fundamental reset of the security operations function.