Menu

Blogs

Showing Blog Posts: 1–10 of 239 tagged Cybersecurity

  • Peer2Peer Sessions You Should Check Out at RSAC 2016

    by Jennifer Lawinski on February 12, 2016

    Are you thinking about attending any Peer2Peer sessions at RSA Conference this year? Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. This year we've once again asked the discussion facilitators to help explain what you can expect from their sessions so that you…

  • Protecting Against the Top Mobile Security Threats in 2016

    by Alisdair Faulkner on February 10, 2016

    By the end of 2016 there will be an estimated 6.4 billion connected devices—a 30 percent increase over 2015—as mobile continues to become the channel-of-choice for everything from online banking to e-commerce. This mobile proliferation is attracting cybercriminals too, and they use stolen identities and compromised devices from major data breaches for advantageous financial gain. Given the…

  • Catching Up with Palo Alto Networks’ Mark McLaughlin

    by Jennifer Lawinski on February 9, 2016

    Mark McLaughlin is Chairman, President and CEO of Palo Alto Networks. We caught up with him to find out what he thinks of the state of information security before his RSA Conference 2016 keynote: The (Inevitable?) Decline of the Digital Age… RSAC: What excites you the most about working in the information security industry? McLaughlin: I’m excited about the progress we are making in helping…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 3: That’s How We Do

    by Wade Baker on February 8, 2016

    This is the third post in a four-part series exploring 25 years of RSA Conference session titles. If you’re new to the series, Part 1 (“From Crypto to Cyber”) and Part 2 (“Hot Trends and Has Beens”) are waiting for you; get ‘em while supplies last. If you’re a repeat customer—welcome back and thanks for your loyalty. This time we’re going to see what the RSAC session corpus says about who we are…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 2: Hot Trends and Has Beens

    by Wade Baker on February 1, 2016

    Welcome to the second post in a series exploring the evolution of the information security industry through the lens of RSA Conference sessions. The first one’s here if you missed it and need some background on what this is all about. Today I’m going to present sundry views into words that have made it to the “top” in some way or another. I put “top” in quotes here because not all these words will…

  • Catching Up With Martin Fink

    by Jennifer Lawinski on January 29, 2016

    Martin Fink is Executive Vice President, Chief Technology Officer and Director of Hewlett Packard Labs, the company’s exploratory and advanced research group. In advance of RSA Conference 2016, we asked him about the state of the information security industry and what he thinks about its future. RSAC: What excites you the most about working in the info security industry? Fink: I'm often amazed at…

  • Data Privacy Day: Your Customers Care About Privacy

    by Jennifer Lawinski on January 28, 2016

    It’s Data Privacy Day. Do you know what your customers think about the way you collect their data? January 28, 2016, marks the ninth annual Data Privacy Day, an international event that hopes to create awareness around data privacy and the importance of protecting your personal information – or that of your employees or customers. (In Europe, they’re celebrating Data Protection Day.) It’s led by…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 1: From Crypto to Cyber

    by Wade Baker on January 27, 2016

    This is the first in a series. You can read the second and third parts here. Last May, I wrote a blog post in response to my daughter’s question “what’s the RSA Conference about, Daddy?” Being a data-driven guy, I wanted to give her an answer that used a quantitative approach, but also captured qualitative aspects of the event as well. I was able to obtain session titles from the RSAC website for…

  • 2016 Is the Year of Developer-Driven Security

    by Chenxi Wang on January 26, 2016

    In the past 10 years or so, the security industry has gone through a number of paradigm changes, most of which were propelled by fundamental shifts in infrastructure or application-related technologies—think cloud or mobile. One such shift that is rapidly changing the way companies are approaching security involves the increasing power of developers and how application infrastructure is being…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 13 Feb 2016 03:49:39 -0500.
© 2016 EMC Corporation. All rights reserved.