Menu

Blogs

Showing Blog Posts: 41–50 of 796

  • Dive into Deep Conversations at Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 16, 2015

    At RSA Conference, you can meet in a group to explore a specific security topic in-depth as part of a Peer-2-Peer session. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short summary to help you decide. This post highlights five P2P sessions (Scroll down for answers). Links to other session summaries are at the…

  • Don’t Miss Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 15, 2015

    By all means, you should try to attend at least one Peer-2-Peer session while at RSA Conference this year. These sessions let you dig into a specific security topic you care about with your industry peers. It is a great opportunity to learn what other people are doing and walk away with new ideas. Wondering which conversation will be the most relevant to your job role and concerns? We asked each…

  • Which Peer-2-Peer Session at RSAC 2015 Interests You?

    by Fahmida Y. Rashid on April 15, 2015

    Have you checked out a Peer-2-Peer session yet? In a Peer2Peer session, you explore a specific security topic with other like-minded peers and a facilitator. There are quite a few sessions, covering enterprise defense, incident response, and privacy, just to name a few. We asked each session facilitator to provide a short summary to help you decide which session will be the most relevant to your…

  • Picking Out Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 14, 2015

    It’s easy to overlook Peer-2-Peer sessions when making your plans, which is a pity. Think about it—you will be digging into a topic you really care about in a room with like-minded peers and a facilitator. We asked each session facilitator to provide a short summary to help you decide which ones to attend this year. This post highlights seven P2P sessions (Scroll down for answers). Links to other…

  • Securosis Guide: Security Management

    by Securosis Team on April 14, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Last year Big Data was all the rage at the RSAC in terms of security monitoring and management. So the big theme this year will be...(drum roll, please)...Big Data. Yes, it's more of the same, though we will see…

  • Which Peer-2-Peer Session Will You Attend at RSAC 2015?

    by Fahmida Y. Rashid on April 13, 2015

    What is a Peer-2-Peer session? Peer2Peer sessions enable groups that share a common interest to come together and explore a specific security topic. You will be digging into a topic you really care about in a room with like-minded peers and a facilitator. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short…

  • Securosis Guide: Data Security

    by Securosis Team on April 13, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Data security is the toughest coverage area to write up this year. It reminds us of those bad apocalypse films, where everyone runs around building DIY tanks and improvising explosives to "save the children," before…

  • Who Steals a Child's Cell Phone?

    by Dale "Woody" Wooden on April 10, 2015

    Dale "Woody" Wooden illustrates security concepts through stories. His past posts discussed how attackers mine employees' social media accounts for information. This story is about how attackers can use social media against you. Let me tell you a story about how social media can be used against you. Recently, I was on a trip for the weekend with my family. The final leg of this trip we stopped…

  • Securosis Guide: Identity and Access Management

    by Securosis Team on April 10, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. No Respect Identity is one of the more difficult topics to cover in our yearly RSAC Guide, because identity issues and trends don't grab headlines. Identity and Access Management vendors tend to be light-years ahead…

  • Securosis Guide: Cloud Security

    by Securosis Team on April 9, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Before delving into the world of cloud security we'd like to remind you of a little basic physics. Today's lesson is on velocity vs. acceleration. Velocity is how fast you are going, and acceleration is how fast…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 25 May 2015 11:29:53 -0400.
© 2015 EMC Corporation. All rights reserved.