RSA Conference 2013 News, Articles and Updates
In this video shot at RSA Conference 2013, Don Gray, chief security strategist at Solutionary, goes InFocus with Eric Green, program director at SC Magazine.
In this video, Dan Kaplan, executive editor at SC Magazine, sits with Larry Ponemon, founder of the Ponemon Institute, at RSA Conference 2013 to discuss a study that was recently conducted by his organization in conjunction with 3M on visual privacy protection.
In this video we go InFocus with Russ Dietz, EVP of products and CTO at Websense, and Andy Oehler, product manager at F5, at this year's RSA Conference 2013 in San Francisco.
In this video, Illena Armstrong, VP of editorial at SC Magazine, sits with Chou at this year's RSA Conference 2013 in San Francisco, to discuss some of the most pressing topics in the industry today.
From "booth babes" to vapid marketing lingo to directionless conversations with vendor reps, one industry veteran wonders how information security professionals can take the RSA Conference showroom floor seriously.
The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
IT management needs to make executives believers before they start implementing their security strategies, according to a longtime security adviser.
With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.
We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.
FBI CISO Patrick Reidy and insider threat analyst Kate Randal spoke on behavioral-based indicators to determine insider threats within the workplace.
Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.
It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Check Point tracks two waves of Cerber ransomware hitting U.S., UK
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- MIRCOP ransomware blames victim for attack, demands $28K ransom
- CYBERCOM 'reluctant' to cut off Islamic State internet
- Chinese tech professional caught selling secrets
- How 154M U.S. voter records will affect Americans' security - industry reacts