Menu

Blogs

  • Securosis Guide: Threat Intelligence & Bothan Spies

    by Securosis Team on February 5, 2016

    Leading image

    Every year we look at different aspects of the security space and the approaching storm that is RSA. One of the overarching themes we have driven ourselves into a frenzy over is the need for threat intelligence. On the analyst side, we are constantly taking briefings from new threat intel vendors claiming to be the next big thing, but we really cannot tell the difference between them. We even have a nifty acronym, "YATIV" (Yet Another Threat Intel Vendor). On the upside, they're still…

  • Maximize Your RSA Conference Journey: Be Sure You See What's New in 2016

    by Britta Glade on February 4, 2016

    With RSA Conference just four weeks away, I can very confidently promise the best content yet. Our speakers and facilitators have been hard at work developing their materials, and our Program Committee has been carefully reviewing their work and providing feedback. My goal is nothing less than blowing you away with the quality of the content we offer. Now is the time to be planning your attack to…

  • The Securosis Guide to the RSA Conference 2016: The FUD Awakens!

    by Securosis Team on February 3, 2016

    It's a bit hard to believe, but our little Securosis Guide to the RSA Conference turns 7 this year. And the RSA Conference folks are throwing our guide a party, with tens of thousands of their closest friends. Oh, how quickly our children grow! It seems only yesterday we were talking about cloud, APT, and compliance as the hot new trends you'd see at the show. Huh. Maybe the security industry…

  • Catching Up with Cisco’s Martin Roesch

    by Jennifer Lawinski on February 2, 2016

    Martin Roesch, Vice President and Chief Architect for Cisco Security Business Group, is responsible for shaping the technology strategy and design of the company’s security portfolio and also oversees threat research. We caught up with him to talk about his interest in information security how he hopes the industry progresses. You can catch his keynote Ascending the Path to Better Security in…

  • Expanding the Reach of RSA Conference

    by Sandra Toms on February 2, 2016

    Many of you have been asking the question: why is the cast of CSI Cyber taking the stage this year? Why are they keynoting over someone more ingrained in the industry? As we celebrate our 25-year anniversary, the melding of cybersecurity and pop culture has never been more prevalent. Movies, television and books focus on online activity ranging from credit theft to cyber espionage, and few things…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 2: Hot Trends and Has Beens

    by Wade Baker on February 1, 2016

    Welcome to the second post in a series exploring the evolution of the information security industry through the lens of RSA Conference sessions. The first one’s here if you missed it and need some background on what this is all about. Today I’m going to present sundry views into words that have made it to the “top” in some way or another. I put “top” in quotes here because not all these words will…

  • Catching Up With Martin Fink

    by Jennifer Lawinski on January 29, 2016

    Martin Fink is Executive Vice President, Chief Technology Officer and Director of Hewlett Packard Labs, the company’s exploratory and advanced research group. In advance of 2016, we asked him about the state of the information security industry and what he thinks about its future. RSAC: What excites you the most about working in the info security industry? Fink: I'm often amazed at how quickly…

  • Data Privacy Day: Your Customers Care About Privacy

    by Jennifer Lawinski on January 28, 2016

    It’s Data Privacy Day. Do you know what your customers think about the way you collect their data? January 28, 2016, marks the ninth annual Data Privacy Day, an international event that hopes to create awareness around data privacy and the importance of protecting your personal information – or that of your employees or customers. (In Europe, they’re celebrating Data Protection Day.) It’s led by…

  • The Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 1: From Crypto to Cyber

    by Wade Baker on January 27, 2016

    Last May, I wrote a blog post in response to my daughter’s question “what’s the RSA Conference about, Daddy?” Being a data-driven guy, I wanted to give her an answer that used a quantitative approach, but also captured qualitative aspects of the event as well. I was able to obtain session titles from the RSAC website for the last four years and do some textual analysis to determine that RSAC was, …

  • 2016 Is the Year of Developer-Driven Security

    by Chenxi Wang on January 26, 2016

    In the past 10 years or so, the security industry has gone through a number of paradigm changes, most of which were propelled by fundamental shifts in infrastructure or application-related technologies—think cloud or mobile. One such shift that is rapidly changing the way companies are approaching security involves the increasing power of developers and how application infrastructure is being…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 05 Feb 2016 21:43:51 -0500.
© 2016 EMC Corporation. All rights reserved.