RSA 2013 NEWS

RSA 2013 News

RSA 2013: iOS safer than Android due to open app model, patching delays

The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.

RSA 2013 News

RSA 2013: Manipulation, then password theft, is the modus operandi of advanced attackers

A session on spear phishing dissected a slew of attacks used against organizations.

RSA 2013 News

RSA 2013: CISOs make security - and business - sense of new technologies

CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.

RSA 2013 News

RSA 2013: Foreign cyber spies setting eyes on U.S. solar energy industry

Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.

In Focus

FEATURED SLIDESHOW

RSA Conference 2013

From a jammed-pack vendor floor to insightful sessions with some of the leading minds in information security, there wasn't a dull moment at this year's big event in San Francisco.

RSA 2013 KEYNOTE CONTRIBUTORS

The new fundamentals of security

The new fundamentals of security

We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.

2013 SC AWARDS FINALIST BLOG

Post-connect network visibility: A fox in the henhouse for network security

It's critical that organizations looking to protect themselves from threats introduced via mobile devices look for a solution that identifies devices and applies access policies BEFORE allowing devices on the network.

The perils of blocking BYOD

IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.

Achieving compliance in today's ever-changing enterprise network

Today's businesses are subject to more rigorous IT compliance and security requirements than ever before.

Sign up to our newsletters

POLL