Blogs

  • RSA Conference Europe - Day 3 Highlights

    by Linda Gray on October 31, 2013

    I can't believe how quickly the 3 days of RSA Conference Europe came around. A big thanks to all the speakers, our sponsors and our delegates contributing to thought provoking and engaging discussions on subjects covering the most topical issues in information security and of course to the buzz on the show floor to what it certainly felt as the largest Europe Conference to date. The most…

  • RSA Conference Europe - Day 2 Highlights

    by Linda Gray on October 30, 2013

    Hope you had a great time in Crypto Commons yesterday evening and had the chance to catch up with your colleagues and peers over drinks. It was great to see the buzz and energy on the show floor. Before I start recapping today's events, here’s a cool highlight – attendees from 69 countries around the world checked into RSAC! As the 9am sessions started this morning some members of the RSA…

  • RSA Conference Europe 2013 - Day 1 Highlights

    by Linda Gray on October 29, 2013

    RSA Conference Europe kicked off today in Amsterdam at the RAI Exhibition and Convention Centre in the Netherlands. We are so excited to be here. While it may be a new venue, we have maintained the same great energy and in-depth content that everyone expects from previous events. The keynotes got the conference off to a great start - being both thought-provoking and engaging. And there was plenty…

  • Testing Cloud Services: How to Test SaaS, PaaS & IaaS

    by Ben Rothke on October 29, 2013

    Gartner Fellow and analyst David Mitchell Smith wrote in his report Hype Cycle for Cloud Computing last year - that while clearly maturing and beyond the peak of inflated expectations, cloud computing continues to be one of the most hyped subjects in IT. The report is far from perfect, but it is accurate in the sense that while cloud computing is indeed ready for prime time, the hype with it…

  • RSA Conference Europe 2013: The Countdown is On

    by Linda Gray on October 23, 2013

    RSA Conference Europe in Amsterdam: The Countdown is On There’s just 3 working days left until the start of RSA Conference Europe 2013 and I’m counting down the hours until I can get on the plane on Saturday and we can get the ball rolling. After 6 years of holding the event in London, we’re really looking forward to being in Amsterdam, for what promises to be a memorable, educational and fun 3…

  • Secret History: The Story of Cryptology

    by Ben Rothke on October 16, 2013

    Narrating a compelling and interesting story about cryptography is not an easy endeavor. Many authors have tried and failed miserably; attempting to create better anecdotes about the adventures of Alice and Bob. David Kahn did the best job of it when wrote The Codebreakers: The story of secret writing in 1967 and set the gold standard on the information security narrative. Kahn’s book was so…

  • Ally's Picks - Spotlight on Europe Podcasts

    by Ally Lorentson Dunn on October 14, 2013

    Looking for a preview of sessions at our upcoming event in Amsterdam? View our podcast page to listen to brief interviews with some of our RSA Conference Europe speakers. We hand picked an assortment of sessions including various topics and tracks to bring you a deeper dive than the session abstract, and a taste of what the live session will offer. Listen to what our speakers have planned for…

  • Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs

    by Ben Rothke on October 8, 2013

    Last month, noted reported Dan Goodin wrote in Security of Java takes a dangerous turn for the worse that people need to beware of increasingly advanced Java exploits. He noted that Java, installed on some three billion devices worldwide, is taking a turn for the worse, thanks to an uptick in attacks targeting vulnerabilities that will never be patched and increasingly sophisticated exploits. …

  • Gupta & Brooks: Using Social Media for Global Security

    by Ben Rothke on October 1, 2013

    While teenagers, marketers, and celebrities seem to dominate the sphere of social media, all those connections can be a valuable tool for security professionals. The notion of social media analytics (SNA) didn’t even exist a few years ago, but it can enable organizations to mine intelligence from social media conversations. Using Social Media for Global Security is written for cybersecurity…

  • Ally's Picks - #SecurityChat on #Privacy

    by Ally Lorentson Dunn on September 30, 2013

    We recently hosted a Twitter chat with security experts on a handful of hot topics around online privacy. One of the questions we asked was, “Who should define expectations for data privacy?” Dejan Kosutic: Organizations must define which information they consider private through classification process. Government should set the standards for privacy of individuals through personal data…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 18 Sep 2014 15:43:25 -0400.
© 2014 EMC Corporation. All rights reserved.