RSA Conference 2013
In this video shot at RSA Conference 2013, Don Gray, chief security strategist at Solutionary, goes InFocus with Eric Green, program director at SC Magazine.
In this video, Dan Kaplan, executive editor at SC Magazine, sits with Larry Ponemon, founder of the Ponemon Institute, at RSA Conference 2013 to discuss a study that was recently conducted by his organization in conjunction with 3M on visual privacy protection.
In this video we go InFocus with Russ Dietz, EVP of products and CTO at Websense, and Andy Oehler, product manager at F5, at this year's RSA Conference 2013 in San Francisco.
In this video, Illena Armstrong, VP of editorial at SC Magazine, sits with Chou at this year's RSA Conference 2013 in San Francisco, to discuss some of the most pressing topics in the industry today.
From "booth babes" to vapid marketing lingo to directionless conversations with vendor reps, one industry veteran wonders how information security professionals can take the RSA Conference showroom floor seriously.
The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
IT management needs to make executives believers before they start implementing their security strategies, according to a longtime security adviser.
With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.
We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.
FBI CISO Patrick Reidy and insider threat analyst Kate Randal spoke on behavioral-based indicators to determine insider threats within the workplace.
Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.
It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.
Sign up to our newsletters
SC Magazine Articles
- CTB-Locker ransomware variant being distributed in spam campaign
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Proposed CFAA revisions agitate IT security community
- New attack uses ransomware to drop trojans and keyloggers
- Firm finds link between Regin spy tool and QWERTY keylogger
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- Winnti trojan may help set stage for Skeleton Key attacks, analysts say
- FTC settles with revenge porn site operator
- Upatre, Dyre used in Univ. of Florida attack
- Wisconsin chiropractic clinic notifies 3,000 patients of insider breach