RSA Conference 2012
Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.
Stephen Cobb, security evangelist at ESET, discusses the hot topics at this year's RSA Conference 2012, including BYOD, attacks on social networks, and resource challenges in today's economy.
Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.
Fortinet's Greg Fitzgerald discusses major vulnerabilities, data management, and privacy and compliance issues in the industry at this year's RSA Conference 2012 in San Francisco.
John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.
A panel discussion on risk management hovered around issues of balancing the scientific element of data gathering with the art of interpreting the information.
While anti-malware strategies and new technology may stump cyber criminals, it's public collaboration they should fear.
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
Hackvistim is not just resulting in high-profile breaches and data loss, it's also shedding light on the neglect many organizations are showing security.
Enrique Salem's keynote speech at the RSA Conference 2012 discussed an emerging enterprise security threat, the "digital native."
Noted security researcher Hugh Thompson, the chief security strategist at People Security and the program chairman of the RSA Conference, discusses how companies may reconsider controversial business decisions if they mean inciting the wrath of the Anonymous hacktivist collective.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- VPN gone bad: APT actors enlist Chinese 'Terracotta' provider to hide criminal activity
- Zero-day exploit hits fully patched Macs
- Harman Kardon claims only Chrysler vehicles may have vulnerable system
- Government 'Cybersecurity Sprint' spurs agency authentication measures