RSA Conference 2012
Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.
Stephen Cobb, security evangelist at ESET, discusses the hot topics at this year's RSA Conference 2012, including BYOD, attacks on social networks, and resource challenges in today's economy.
Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.
Fortinet's Greg Fitzgerald discusses major vulnerabilities, data management, and privacy and compliance issues in the industry at this year's RSA Conference 2012 in San Francisco.
John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.
A panel discussion on risk management hovered around issues of balancing the scientific element of data gathering with the art of interpreting the information.
While anti-malware strategies and new technology may stump cyber criminals, it's public collaboration they should fear.
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
Hackvistim is not just resulting in high-profile breaches and data loss, it's also shedding light on the neglect many organizations are showing security.
Enrique Salem's keynote speech at the RSA Conference 2012 discussed an emerging enterprise security threat, the "digital native."
Noted security researcher Hugh Thompson, the chief security strategist at People Security and the program chairman of the RSA Conference, discusses how companies may reconsider controversial business decisions if they mean inciting the wrath of the Anonymous hacktivist collective.
Sign up to our newsletters
SC Magazine Articles
- Supreme Court hears first appeals case for exec convicted under CFAA
- Black SEO offered to cyber-criminals
- FBI investigates Russian hacker that stole billions of login credentials
- 5M affected in VTech breach; security concerns raised with popular holiday items
- Internet of malicious things: Yale home automation vulnerable