Menu

Blogs

Showing Blog Posts: 41–50 of 292 tagged Cybersecurity

  • Can a Government Encryption Backdoor and Privacy Coexist?

    by Chenxi Wang on February 28, 2016

    On March 2 at 9:10 a.m. at the RSA Conference, I’ll be running a panel discussion on “Can government encryption backdoor and privacy coexist, or is it an oxymoron?” with Michelle Dennedy, the Chief Privacy Officer of Cisco, Richard Marshall, former General Counsel for the NSA, and Dr. Matthew Green, the Economist’s go-to source for encryption technologies. My idea is to bring in a privacy expert, …

  • Introducing the RSA Conference Job Board

    by Jennifer Lawinski on February 26, 2016

    As the security community gathers together in San Francisco for the RSA Conference next week, they might notice a new feature on the conference website: the RSA Conference Job Board. We heard you, and we've responded to the community's need to find qualified security professionals by creating a new place that companies can post their cybersecurity openings—and that security pros can look for new…

  • RSA Conference 2016: What Will Everyone Be Talking About?

    by Tony Kontzer on February 26, 2016

    Take it from a veteran of the past several RSA Conferences: If there's one thing attendees at next week's gathering in San Francisco can count on, it'll be a slew of reminders of how everything we hear relates to the current news cycle. Whether it's been analyzing the revelations surrounding whistle-blower Edward Snowden, going over the details of the huge Target data breach of 2013, or engaging…

  • Which Peer2Peer Sessions Should You Attend at RSAC 2016?

    by Jennifer Lawinski on February 25, 2016

    Are you ready for this year's RSA Conference in San Francisco? Have you decided which Peer2Peer sessions you'd like to attend? Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. This year we've once again asked the discussion facilitators to help explain what you…

  • Make Sure You Don’t Miss These Peer2Peer Sessions at RSAC 2016

    by Jennifer Lawinski on February 24, 2016

    Are you still trying to choose which Peer2Peer conversations you'd like to join at the RSA Conference this year in San Francisco? Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. This year we've once again asked the discussion facilitators to help explain what…

  • Securosis Guide: Data Security Deep Dive

    by Securosis Team on February 24, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Ransomware. Pwning the IoT. Backdoors. Botnets. Skimmers. APT. Malicious apps. The NSA. Lots and lots of noise from the press about these scary threats, but what grabs the headline is not what drives the security…

  • Don't Miss These Peer2Peer Sessions at RSA Conference 2016

    by Jennifer Lawinski on February 23, 2016

    Are you planning on checking out any of the Peer2Peer sessions at RSA Conference 2016? Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. This year we've once again asked the discussion facilitators to help explain what you can expect from their sessions so that…

  • Securosis Guide: All Threats, All the Time…

    by Securosis Team on February 22, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. This is our first post into our series of deep dives. Instead of focusing on technology coverage areas this year, we decided to break things out into “problems” that map more closely to security projects. As we’ve…

  • Securosis Guide: Attack of the (Analytics) Clones

    by Securosis Team on February 19, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Opening Crawl... "There is unrest in IT security. Thousand of malicious events pass undetected each day, and have overwhelmed the limited capabilities of SIEM to protect the enterprise. These attackers and rogue…

  • Which Peer2Peer Sessions Are Right For You at RSAC 2016?

    by Jennifer Lawinski on February 18, 2016

    If you’re the type that likes talking about security-related topics with your colleagues (and who doesn’t?) then you should check out some of the Peer2Peer sessions at this year’s RSA Conference in San Francisco. Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. …

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 04 May 2016 13:24:00 -0400.
© 2016 EMC Corporation. All rights reserved.