Menu

Blogs

Showing Blog Posts: 1–10 of 118 tagged Enterprise Defense

  • Learning About New Attack Techniques at RSAC 2015

    by Tony Kontzer on April 22, 2015

    A funny thing happened on my way to a session at the RSA Conference Tuesday. Long before I got there, and as I was checking messages on my phone, I nearly walked right into the back of a line. But for what? There were hundreds of people standing in line in the concourse, and hundreds of others rifling through their conference guides trying to figure out what all of the hubbub was. I smelled a…

  • RSA's Amit Yoran: Security is Stumbling Around in the Dark

    by Tony Kontzer on April 21, 2015

    Amit Yoran clearly knows a good metaphor when he sees one. Or in this case, doesn’t see one. Yoran, who was named RSA Security's president last fall, took the stage at the RSA Conference in San Francisco Tuesday to deliver his first opening keynote. In the dark. And he let the audience of thousands sit there, in the pitch black, for an excruciatingly long moment before offering the first glimpses…

  • Homeland Security Chief Talks Cybersecurity Mission at RSAC 2015

    by Tony Kontzer on April 21, 2015

    Jeh Johnson knows all too well how important security is. As the secretary of the U.S. Department of Homeland Security, Johnson not only is responsible for protecting the nation from terrorists, he's also accompanied by a secret service detail everywhere he goes. There was a time when that kind of physical was enough, but the world has changed. During a keynote at the RSA Conference in San…

  • Dive into Deep Conversations at Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 16, 2015

    At RSA Conference, you can meet in a group to explore a specific security topic in-depth as part of a Peer-2-Peer session. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short summary to help you decide. This post highlights five P2P sessions (Scroll down for answers). Links to other session summaries are at the…

  • Securosis Guide: Security Management

    by Securosis Team on April 14, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Last year Big Data was all the rage at the RSAC in terms of security monitoring and management. So the big theme this year will be...(drum roll, please)...Big Data. Yes, it's more of the same, though we will see…

  • Picking Out Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 14, 2015

    It’s easy to overlook Peer-2-Peer sessions when making your plans, which is a pity. Think about it—you will be digging into a topic you really care about in a room with like-minded peers and a facilitator. We asked each session facilitator to provide a short summary to help you decide which ones to attend this year. This post highlights seven P2P sessions (Scroll down for answers). Links to other…

  • Which Peer-2-Peer Session Will You Attend at RSAC 2015?

    by Fahmida Y. Rashid on April 13, 2015

    What is a Peer-2-Peer session? Peer2Peer sessions enable groups that share a common interest to come together and explore a specific security topic. You will be digging into a topic you really care about in a room with like-minded peers and a facilitator. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short…

  • Securosis Guide: 2015 Endpoint Security Trends

    by Securosis Team on April 7, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. What you'll see at the RSAC in terms of endpoint security is really more of the same. Advanced attacks blah, mobile devices blah blah, AV-vendor hatred blah blah blah. Just a lot of blah... But we are still recovering…

  • Securosis Guide: Welcome to the Coverage Area Deep Dives

    by Securosis Team on April 6, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. While everyone likes to talk about the "security market" or the "security industry," in practice security is more a collection of markets, tools, and practices all competing for our time, attention, and dollars. Here…

  • Securosis Guide: DevOpsX Games

    by Securosis Team on April 2, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. DevOps is one of the hottest trends in all of IT—sailing over every barrier in front of it like a boardercross racer catching big air on the last roller before the drop to the finish. (We'd translate that, but don't…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 25 Apr 2015 06:54:42 -0400.
© 2015 EMC Corporation. All rights reserved.