RSA Conference 2012
Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.
Stephen Cobb, security evangelist at ESET, discusses the hot topics at this year's RSA Conference 2012, including BYOD, attacks on social networks, and resource challenges in today's economy.
Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.
Fortinet's Greg Fitzgerald discusses major vulnerabilities, data management, and privacy and compliance issues in the industry at this year's RSA Conference 2012 in San Francisco.
John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.
A panel discussion on risk management hovered around issues of balancing the scientific element of data gathering with the art of interpreting the information.
While anti-malware strategies and new technology may stump cyber criminals, it's public collaboration they should fear.
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
Hackvistim is not just resulting in high-profile breaches and data loss, it's also shedding light on the neglect many organizations are showing security.
Enrique Salem's keynote speech at the RSA Conference 2012 discussed an emerging enterprise security threat, the "digital native."
Noted security researcher Hugh Thompson, the chief security strategist at People Security and the program chairman of the RSA Conference, discusses how companies may reconsider controversial business decisions if they mean inciting the wrath of the Anonymous hacktivist collective.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes