Menu

Blogs

  • Securosis Guide: Escape from Cloud City

    by Securosis Team on February 11, 2016

    Cloud computing has been a pretty steady theme in both this RSAC Guide and the conference itself. Heck, it was our very first theme in our very first Guide back in 2010, and has shown up as a theme every year since. As much as we'd love to move past it to something "new" we strongly suspect you will see more cloud, not less, this year. Besides, while we eagerly anticipate the impending emergence…

  • Protecting Against the Top Mobile Security Threats in 2016

    by Alisdair Faulkner on February 10, 2016

    By the end of 2016 there will be an estimated 6.4 billion connected devices—a 30 percent increase over 2015—as mobile continues to become the channel-of-choice for everything from online banking to e-commerce. This mobile proliferation is attracting cybercriminals too, and they use stolen identities and compromised devices from major data breaches for advantageous financial gain. Given the…

  • Securosis Guide: R2DevOps

    by Securosis Team on February 9, 2016

    If cloud is a new operational model (spoiler, it totally is), DevOps is the operational framework to fit it. Automation and standardization is awesome, but do you want an R2 working for you or a Battle Droid that's as likely to blast your Separatist envoy as the clone troopers in front of it? DevOps has been around for five years now and in the last year or so has really started to gain traction…

  • Catching Up with Palo Alto Networks’ Mark McLaughlin

    by Jennifer Lawinski on February 9, 2016

    Mark McLaughlin is Chairman, President and CEO of Palo Alto Networks. We caught up with him to find out what he thinks of the state of information security before his RSA Conference 2016 keynote: The (Inevitable?) Decline of the Digital Age… RSAC: What excites you the most about working in the information security industry? McLaughlin: I’m excited about the progress we are making in helping…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 3: That’s How We Do

    by Wade Baker on February 8, 2016

    This is the third post in a four-part series exploring 25 years of RSA Conference session titles. If you’re new to the series, Part 1 (“From Crypto to Cyber”) and Part 2 (“Hot Trends and Has Beens”) are waiting for you; get ‘em while supplies last. If you’re a repeat customer—welcome back and thanks for your loyalty. This time we’re going to see what the RSAC session corpus says about who we are…

  • Securosis Guide: Threat Intelligence & Bothan Spies

    by Securosis Team on February 5, 2016

    Every year we look at different aspects of the security space and the approaching storm that is RSA. One of the overarching themes we have driven ourselves into a frenzy over is the need for threat intelligence. On the analyst side, we are constantly taking briefings from new threat intel vendors claiming to be the next big thing, but we really cannot tell the difference between them. We even…

  • Maximize Your RSA Conference Journey: Be Sure You See What's New in 2016

    by Britta Glade on February 4, 2016

    With RSA Conference just four weeks away, I can very confidently promise the best content yet. Our speakers and facilitators have been hard at work developing their materials, and our Program Committee has been carefully reviewing their work and providing feedback. My goal is nothing less than blowing you away with the quality of the content we offer. Now is the time to be planning your attack to…

  • The Securosis Guide to the RSA Conference 2016: The FUD Awakens!

    by Securosis Team on February 3, 2016

    It's a bit hard to believe, but our little Securosis Guide to the RSA Conference turns 7 this year. And the RSA Conference folks are throwing our guide a party, with tens of thousands of their closest friends. Oh, how quickly our children grow! It seems only yesterday we were talking about cloud, APT, and compliance as the hot new trends you'd see at the show. Huh. Maybe the security industry…

  • Expanding the Reach of RSA Conference

    by Sandra Toms on February 2, 2016

    Many of you have been asking the question: why is the cast of CSI Cyber taking the stage this year? Why are they keynoting over someone more ingrained in the industry? As we celebrate our 25-year anniversary, the melding of cybersecurity and pop culture has never been more prevalent. Movies, television and books focus on online activity ranging from credit theft to cyber espionage, and few things…

  • Catching Up with Cisco’s Martin Roesch

    by Jennifer Lawinski on February 2, 2016

    Martin Roesch, Vice President and Chief Architect for Cisco Security Business Group, is responsible for shaping the technology strategy and design of the company’s security portfolio and also oversees threat research. We caught up with him to talk about his interest in information security how he hopes the industry progresses. You can catch his keynote Ascending the Path to Better Security in…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 11 Feb 2016 14:06:07 -0500.
© 2016 EMC Corporation. All rights reserved.