Menu

Blogs

  • Securosis Guide: Network Security

    by Securosis Team on April 8, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. We had a little trouble coming up with a novel and pithy backdrop for what you will see in the Network Security space at RSAC 2015. We wonder if this year we will see the first IoT firewall, because hacking…

  • Statistics Done Wrong: The Woefully Complete Guide

    by Ben Rothke on April 8, 2015

    It’s unclear who really said that “there are three kinds of lies: lies, damned lies, and statistics”. But the reality is that statistics are often misunderstood and misused. In Statistics Done Wrong: The Woefully Complete Guide, author Alex Reinhart, a statistics instructor and PhD student at Carnegie Mellon University, makes the case that most people, even those in the sciences, are misusing…

  • Asia is Technology's Newest Center of Innovation

    by Fahmida Y. Rashid on April 8, 2015

    Information security in Asia is on the cusp of tremendous change. Technology’s roots may be in Silicon Valley, but the center of innovation is shifting to Asia. The region leads the world in digital adoption and disruption. New technology is being taken, applied, developed, and rolled out, driving adoption across APJ and beyond. The balance of power is also changing. Asia is now home to more…

  • Congrats to Everyone in Our First #RSAC Crowdsource Program, We Learned a Lot

    by Britta Glade on April 7, 2015

    The wait is over. We now have a slate of crowdsource sessions. Congratulations to everyone who participated in this inaugural program. We experimented with a new way of selecting educational sessions. We took a risk, and it was an exciting roller coaster ride. With a diverse—and vocal!—Program Committee by my side, we approached this experiment with the following tenets: Provide a lighter weight…

  • Securosis Guide: 2015 Endpoint Security Trends

    by Securosis Team on April 7, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. What you'll see at the RSAC in terms of endpoint security is really more of the same. Advanced attacks blah, mobile devices blah blah, AV-vendor hatred blah blah blah. Just a lot of blah... But we are still recovering…

  • Securosis Guide: Welcome to the Coverage Area Deep Dives

    by Securosis Team on April 6, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. While everyone likes to talk about the "security market" or the "security industry," in practice security is more a collection of markets, tools, and practices all competing for our time, attention, and dollars. Here…

  • Know Before You Go: Your First RSAC

    by Fahmida Y. Rashid on April 6, 2015

    Security professionals from around the world come to RSA Conference for an intense week of learning, networking, and meetings. The expo floor is huge and this year, attendees can pick from more than 490 sessions. There are parallel initiatives, such as the various half-day seminars on Monday (April 20), the Innovation Sandbox contest (also Monday, April 20), hands-on demos in the Sandbox, and the …

  • Know Before You Go: Prepping for RSAC 2015

    by Fahmida Y. Rashid on April 3, 2015

    Each year, RSA Conference brings together security professionals from around the world for an intense week of learning and networking. Over 700 speakers are participating in more than 490 presentations and discussions during the week. The Expo Halls are jam-packed with security companies showing off their products. Learn about companies taking innovative approaches to solve serious security…

  • Securosis Guide: DevOpsX Games

    by Securosis Team on April 2, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. DevOps is one of the hottest trends in all of IT—sailing over every barrier in front of it like a boardercross racer catching big air on the last roller before the drop to the finish. (We'd translate that, but don't…

  • Dig Deep into Security Topics With RSAC 2015 Learning Labs

    by Britta Glade on April 1, 2015

    At RSA Conference, we are hyper-focused on our attendees’ experience. What works for them? What doesn’t work for them? What do they want more of—or less? We scrutinize the feedback from our attendees and challenge ourselves to make every RSA Conference experience energizing, empowering, and enjoyable. From an education content standpoint, I listened and learned a lot from our delegates this year…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 01 Jul 2015 00:51:57 -0400.
© 2015 EMC Corporation. All rights reserved.