RSA Conference 2013
In this video shot at RSA Conference 2013, Don Gray, chief security strategist at Solutionary, goes InFocus with Eric Green, program director at SC Magazine.
In this video, Dan Kaplan, executive editor at SC Magazine, sits with Larry Ponemon, founder of the Ponemon Institute, at RSA Conference 2013 to discuss a study that was recently conducted by his organization in conjunction with 3M on visual privacy protection.
In this video we go InFocus with Russ Dietz, EVP of products and CTO at Websense, and Andy Oehler, product manager at F5, at this year's RSA Conference 2013 in San Francisco.
In this video, Illena Armstrong, VP of editorial at SC Magazine, sits with Chou at this year's RSA Conference 2013 in San Francisco, to discuss some of the most pressing topics in the industry today.
From "booth babes" to vapid marketing lingo to directionless conversations with vendor reps, one industry veteran wonders how information security professionals can take the RSA Conference showroom floor seriously.
The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
IT management needs to make executives believers before they start implementing their security strategies, according to a longtime security adviser.
With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.
We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.
FBI CISO Patrick Reidy and insider threat analyst Kate Randal spoke on behavioral-based indicators to determine insider threats within the workplace.
Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.
It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.
Sign up to our newsletters
SC Magazine Articles
- DDoS attacks enter new frontier with Portmapper
- John McAfee points to lone woman as Ashley Madison attacker while company offers reward
- Zero-Day, Angler kit exploits help drive up malvertising by 325%
- Judge grants father in custody case access to ex-wife's Facebook profile
- IBM: Corporations could be the next target for ransomware attacks