Menu

Blogs

  • Protecting Against the Top Mobile Security Threats in 2016

    by Alisdair Faulkner on February 10, 2016

    Leading image

    By the end of 2016 there will be an estimated 6.4 billion connected devices—a 30 percent increase over 2015—as mobile continues to become the channel-of-choice for everything from online banking to e-commerce. This mobile proliferation is attracting cybercriminals too, and they use stolen identities and compromised devices from major data breaches for advantageous financial gain. Given the increase in connected devices, the following are several mobile security trends to expect this year: …

  • Securosis Guide: R2DevOps

    by Securosis Team on February 9, 2016

    If cloud is a new operational model (spoiler, it totally is), DevOps is the operational framework to fit it. Automation and standardization is awesome, but do you want an R2 working for you or a Battle Droid that's as likely to blast your Separatist envoy as the clone troopers in front of it? DevOps has been around for five years now and in the last year or so has really started to gain traction…

  • Catching Up with Palo Alto Networks’ Mark McLaughlin

    by Jennifer Lawinski on February 9, 2016

    Mark McLaughlin is Chairman, President and CEO of Palo Alto Networks. We caught up with him to find out what he thinks of the state of information security before his RSA Conference 2016 keynote: The (Inevitable?) Decline of the Digital Age… RSAC: What excites you the most about working in the information security industry? McLaughlin: I’m excited about the progress we are making in helping…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 3: That’s How We Do

    by Wade Baker on February 8, 2016

    This is the third post in a four-part series exploring 25 years of RSA Conference session titles. If you’re new to the series, Part 1 (“From Crypto to Cyber”) and Part 2 (“Hot Trends and Has Beens”) are waiting for you; get ‘em while supplies last. If you’re a repeat customer—welcome back and thanks for your loyalty. This time we’re going to see what the RSAC session corpus says about who we are…

  • Securosis Guide: Threat Intelligence & Bothan Spies

    by Securosis Team on February 5, 2016

    Every year we look at different aspects of the security space and the approaching storm that is RSA. One of the overarching themes we have driven ourselves into a frenzy over is the need for threat intelligence. On the analyst side, we are constantly taking briefings from new threat intel vendors claiming to be the next big thing, but we really cannot tell the difference between them. We even…

  • Maximize Your RSA Conference Journey: Be Sure You See What's New in 2016

    by Britta Glade on February 4, 2016

    With RSA Conference just four weeks away, I can very confidently promise the best content yet. Our speakers and facilitators have been hard at work developing their materials, and our Program Committee has been carefully reviewing their work and providing feedback. My goal is nothing less than blowing you away with the quality of the content we offer. Now is the time to be planning your attack to…

  • The Securosis Guide to the RSA Conference 2016: The FUD Awakens!

    by Securosis Team on February 3, 2016

    It's a bit hard to believe, but our little Securosis Guide to the RSA Conference turns 7 this year. And the RSA Conference folks are throwing our guide a party, with tens of thousands of their closest friends. Oh, how quickly our children grow! It seems only yesterday we were talking about cloud, APT, and compliance as the hot new trends you'd see at the show. Huh. Maybe the security industry…

  • Expanding the Reach of RSA Conference

    by Sandra Toms on February 2, 2016

    Many of you have been asking the question: why is the cast of CSI Cyber taking the stage this year? Why are they keynoting over someone more ingrained in the industry? As we celebrate our 25-year anniversary, the melding of cybersecurity and pop culture has never been more prevalent. Movies, television and books focus on online activity ranging from credit theft to cyber espionage, and few things…

  • Catching Up with Cisco’s Martin Roesch

    by Jennifer Lawinski on February 2, 2016

    Martin Roesch, Vice President and Chief Architect for Cisco Security Business Group, is responsible for shaping the technology strategy and design of the company’s security portfolio and also oversees threat research. We caught up with him to talk about his interest in information security how he hopes the industry progresses. You can catch his keynote Ascending the Path to Better Security in…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 2: Hot Trends and Has Beens

    by Wade Baker on February 1, 2016

    Welcome to the second post in a series exploring the evolution of the information security industry through the lens of RSA Conference sessions. The first one’s here if you missed it and need some background on what this is all about. Today I’m going to present sundry views into words that have made it to the “top” in some way or another. I put “top” in quotes here because not all these words will…

  • Catching Up With Martin Fink

    by Jennifer Lawinski on January 29, 2016

    Martin Fink is Executive Vice President, Chief Technology Officer and Director of Hewlett Packard Labs, the company’s exploratory and advanced research group. In advance of RSA Conference 2016, we asked him about the state of the information security industry and what he thinks about its future. RSAC: What excites you the most about working in the info security industry? Fink: I'm often amazed at…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 10 Feb 2016 19:22:35 -0500.
© 2016 EMC Corporation. All rights reserved.