Showing Blog Posts: 1–10 of 31 by Tony Kontzer

Tony Kontzer

Tony Kontzer

RSA Conference

  • RSA Conference 2016: The Week in Review

    by Tony Kontzer on March 11, 2016

    I don't know about you, but I always find myself swept away by the momentum of a big event like the just-concluded RSA Conference, but when it ends, brother, do I get a conference hangover. For what seems like days after I return home, my brain is mush and I can fall asleep on a dime. If anyone in my house so much as whispered the term "information security" during those first days back, I'd cut…

  • Beyond Encryption: Experts Discuss Encryption, Privacy at RSAC 2016

    by Tony Kontzer on March 7, 2016

    While it may not be the ideal case to serve as precedent, Apple's battle with the FBI over the notorious iPhone that belonged to a shooter in the San Bernardino, Calif., attacks last year could nonetheless prove to be a seminal moment for the future of information security and privacy. A keynote panel of some of the U.S.'s best-known security and privacy experts told thousands of attendees at the…

  • CISOs Share Tales From the Trenches at RSA Conference 2016

    by Tony Kontzer on March 3, 2016

    There are many themes that stretch across the information security world, but most organizations face their own particular challenges that require customized approaches. This was the clear takeaway from a well-attended panel at the RSA Conference Thursday, Lessons Learned from Real-World CISOs, during which CISOs from the medical device, education, health insurance and consumer goods sectors…

  • How Law Enforcement Agencies Fight Cyber Crime

    by Tony Kontzer on March 3, 2016

    Information security professionals have a plethora of technological tools at their disposal to fight would-be attackers—and more are on the way. The traditional prevention, detection and response technologies are soon to be augmented by innovative new tools that can do things such as spoof entire network topographies on the fly to deceive attackers. Yet a panel of federal law enforcement…

  • Dispatches from the RSA Conference Expo Floor

    by Tony Kontzer on March 3, 2016

    I have trolled through many a conference exhibition hall in search of stories and swag for my kids, and there are always surprises waiting. I've played military "games," watched jugglers, and even had a conversation with a robot at past events. But I have never seen so many creative efforts at drawing eyeballs to a conference booth than at this year's RSA Conference in San Francisco. RSAC has…

  • How Do Google, Microsoft and Adobe Think About Privacy?

    by Tony Kontzer on March 2, 2016

    You may have noticed that privacy has become sort of a big deal of late. From Apple's battle with the FBI to ongoing work on developing an international privacy regulation, privacy issues have taken center stage, right next to the plethora of security challenges companies face. At the RSA Conference on Tuesday, a panel of privacy executives from Microsoft, Google and Adobe took on the topic, and…

  • Government in the Crossfire: The Challenge of Data Privacy

    by Tony Kontzer on March 2, 2016

    If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be…

  • Struggle to Retain Top Cybersecurity Talent Crosses Borders: A Panel Discussion

    by Tony Kontzer on March 2, 2016

    Security is hard, but it's even harder for government agencies than it is for private sector companies. Government entities generally hold more data, and are targeted more frequently as a result. They have less incentive to take risks and innovate. And they struggle to hold on to their best people. It was with that backdrop that three "Cyber Wisemen" were asked to share their thoughts about the…

  • Streamline the Cloud: How Companies Use Cloud Access Security Brokers

    by Tony Kontzer on March 2, 2016

    Growing numbers of information security executives are learning just how expansive their organizations' use of cloud computing are. And let's just say the findings are often shocking. With many companies unknowingly using thousands of cloud services, it's no wonder they're turning in larger numbers to cloud access security brokers. CASBs, as they're referred to, are essentially security…

  • RSAC 2016 Keynote Speakers Talk Apple, Encryption and the FBI

    by Tony Kontzer on March 1, 2016

    It's official: The information security community is firmly behind Apple in its battle with the FBI over the fate of the infamous iPhone 5 belonging to one of the shooters in last year's terrorist attack in San Bernardino, Calif. A succession of keynote speakers Tuesday at the RSA Conference in San Francisco made their allegiances clear, agreeing with Apple's perspective that developing a…

This document was retrieved from on Fri, 21 Oct 2016 16:07:30 -0400.
© 2016 EMC Corporation. All rights reserved.