Menu

Blogs

Showing Blog Posts: 1–10 of 105 tagged Security

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 3: That’s How We Do

    by Wade Baker on February 8, 2016

    This is the third post in a four-part series exploring 25 years of RSA Conference session titles. If you’re new to the series, Part 1 (“From Crypto to Cyber”) and Part 2 (“Hot Trends and Has Beens”) are waiting for you; get ‘em while supplies last. If you’re a repeat customer—welcome back and thanks for your loyalty. This time we’re going to see what the RSAC session corpus says about who we are…

  • Securosis Guide: Threat Intelligence & Bothan Spies

    by Securosis Team on February 5, 2016

    Every year we look at different aspects of the security space and the approaching storm that is RSA. One of the overarching themes we have driven ourselves into a frenzy over is the need for threat intelligence. On the analyst side, we are constantly taking briefings from new threat intel vendors claiming to be the next big thing, but we really cannot tell the difference between them. We even…

  • Catching Up with Cisco’s Martin Roesch

    by Jennifer Lawinski on February 2, 2016

    Martin Roesch, Vice President and Chief Architect for Cisco Security Business Group, is responsible for shaping the technology strategy and design of the company’s security portfolio and also oversees threat research. We caught up with him to talk about his interest in information security how he hopes the industry progresses. You can catch his keynote Ascending the Path to Better Security in…

  • Expanding the Reach of RSA Conference

    by Sandra Toms on February 2, 2016

    Many of you have been asking the question: why is the cast of CSI Cyber taking the stage this year? Why are they keynoting over someone more ingrained in the industry? As we celebrate our 25-year anniversary, the melding of cybersecurity and pop culture has never been more prevalent. Movies, television and books focus on online activity ranging from credit theft to cyber espionage, and few things…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 2: Hot Trends and Has Beens

    by Wade Baker on February 1, 2016

    Welcome to the second post in a series exploring the evolution of the information security industry through the lens of RSA Conference sessions. The first one’s here if you missed it and need some background on what this is all about. Today I’m going to present sundry views into words that have made it to the “top” in some way or another. I put “top” in quotes here because not all these words will…

  • Catching Up With Martin Fink

    by Jennifer Lawinski on January 29, 2016

    Martin Fink is Executive Vice President, Chief Technology Officer and Director of Hewlett Packard Labs, the company’s exploratory and advanced research group. In advance of RSA Conference 2016, we asked him about the state of the information security industry and what he thinks about its future. RSAC: What excites you the most about working in the info security industry? Fink: I'm often amazed at…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 1: From Crypto to Cyber

    by Wade Baker on January 27, 2016

    Last May, I wrote a blog post in response to my daughter’s question “what’s the RSA Conference about, Daddy?” Being a data-driven guy, I wanted to give her an answer that used a quantitative approach, but also captured qualitative aspects of the event as well. I was able to obtain session titles from the RSAC website for the last four years and do some textual analysis to determine that RSAC was, …

  • 2016 Is the Year of Developer-Driven Security

    by Chenxi Wang on January 26, 2016

    In the past 10 years or so, the security industry has gone through a number of paradigm changes, most of which were propelled by fundamental shifts in infrastructure or application-related technologies—think cloud or mobile. One such shift that is rapidly changing the way companies are approaching security involves the increasing power of developers and how application infrastructure is being…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

  • Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

    by Ben Rothke on January 19, 2016

    Anyone who has spent time in the information security industry knows what while there is good data around; there is a lot to be desired in terms of empirical and measurable information security data. There’s too much marketing hype, combined with firms who often don’t know how to make sense out of their own data. In Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 10 Feb 2016 05:41:48 -0500.
© 2016 EMC Corporation. All rights reserved.