Menu

Blogs

  • Expanding the Reach of RSA Conference

    by Sandra Toms on February 2, 2016

    Many of you have been asking the question: why is the cast of CSI Cyber taking the stage this year? Why are they keynoting over someone more ingrained in the industry? As we celebrate our 25-year anniversary, the melding of cybersecurity and pop culture has never been more prevalent. Movies, television and books focus on online activity ranging from credit theft to cyber espionage, and few things…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 2: Hot Trends and Has Beens

    by Wade Baker on February 1, 2016

    Welcome to the second post in a series exploring the evolution of the information security industry through the lens of RSA Conference sessions. The first one’s here if you missed it and need some background on what this is all about. Today I’m going to present sundry views into words that have made it to the “top” in some way or another. I put “top” in quotes here because not all these words will…

  • Catching Up With Martin Fink

    by Jennifer Lawinski on January 29, 2016

    Martin Fink is Executive Vice President, Chief Technology Officer and Director of Hewlett Packard Labs, the company’s exploratory and advanced research group. In advance of RSA Conference 2016, we asked him about the state of the information security industry and what he thinks about its future. RSAC: What excites you the most about working in the info security industry? Fink: I'm often amazed at…

  • Data Privacy Day: Your Customers Care About Privacy

    by Jennifer Lawinski on January 28, 2016

    It’s Data Privacy Day. Do you know what your customers think about the way you collect their data? January 28, 2016, marks the ninth annual Data Privacy Day, an international event that hopes to create awareness around data privacy and the importance of protecting your personal information – or that of your employees or customers. (In Europe, they’re celebrating Data Protection Day.) It’s led by…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 1: From Crypto to Cyber

    by Wade Baker on January 27, 2016

    This is the first in a series. You can read the second and third parts here. Last May, I wrote a blog post in response to my daughter’s question “what’s the RSA Conference about, Daddy?” Being a data-driven guy, I wanted to give her an answer that used a quantitative approach, but also captured qualitative aspects of the event as well. I was able to obtain session titles from the RSAC website for…

  • 2016 Is the Year of Developer-Driven Security

    by Chenxi Wang on January 26, 2016

    In the past 10 years or so, the security industry has gone through a number of paradigm changes, most of which were propelled by fundamental shifts in infrastructure or application-related technologies—think cloud or mobile. One such shift that is rapidly changing the way companies are approaching security involves the increasing power of developers and how application infrastructure is being…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

  • Weekend Reading: Snowpocalypse Edition

    by Jennifer Lawinski on January 22, 2016

    We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the cybersecurity world, chosen by the field's best writers and editors. If you're on the East Coast this weekend, chances are you'll have plenty of time on your hands to read. (Unless, of course, you're…

  • The Reality of Our Registration Twitter Promotion

    by Sandra Toms on January 22, 2016

    As some of you may have seen, a social media plug-in to our encrypted Conference registration system had some of our attendees concerned we were collecting Twitter passwords in our databases. RSA Conference 2016 has not and will not collect or store attendee Twitter password information during its Conference registration process. The “Tweet this” functionality on our encrypted registration page…

  • Cybercrime and Threats Are Growing in 2016

    by RSAC Contributor on January 21, 2016

    This post in our VC-series comes from Alberto Yépez and Don Dixon, managing directors of Trident Capital Cybersecurity. It’s a new year, and we are poised again for another round of malicious, often successful cyberattacks, many of which will draw upon ever more sophisticated technology. And some of which will be surprisingly deceptive. Take, for example, so-called “onion-layered” security…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 14 Feb 2016 11:55:57 -0500.
© 2016 EMC Corporation. All rights reserved.