RSA Conference 2013
In this video shot at RSA Conference 2013, Don Gray, chief security strategist at Solutionary, goes InFocus with Eric Green, program director at SC Magazine.
In this video, Dan Kaplan, executive editor at SC Magazine, sits with Larry Ponemon, founder of the Ponemon Institute, at RSA Conference 2013 to discuss a study that was recently conducted by his organization in conjunction with 3M on visual privacy protection.
In this video we go InFocus with Russ Dietz, EVP of products and CTO at Websense, and Andy Oehler, product manager at F5, at this year's RSA Conference 2013 in San Francisco.
In this video, Illena Armstrong, VP of editorial at SC Magazine, sits with Chou at this year's RSA Conference 2013 in San Francisco, to discuss some of the most pressing topics in the industry today.
From "booth babes" to vapid marketing lingo to directionless conversations with vendor reps, one industry veteran wonders how information security professionals can take the RSA Conference showroom floor seriously.
The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
IT management needs to make executives believers before they start implementing their security strategies, according to a longtime security adviser.
With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.
We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.
FBI CISO Patrick Reidy and insider threat analyst Kate Randal spoke on behavioral-based indicators to determine insider threats within the workplace.
Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.
It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed
- Puush urges users to change passwords after cyber attack