RSA Conference
RSA Conference
Blog Post
  • Anyone who attended this year's RSA Conference in San Francisco can attest to the prominent portion of mindshare that security and privacy practitioners were devoting at that time to the European Union's General Data Protection Regulation (GDPR), which went into effect last month. GDPR, which at its essence gives consumers the final say on how their data is handled, has been a long time coming. It...

RSA Conference
RSA Conference
Blog Post
  • So what does the RSA Conference team do post the US event (besides work on our RSAC Unplugged and RSAC APJ events)? We prepare for boot camp! Boot camp is aptly named. It is our RSA Conference design kick off meeting – an intense three-days of actively planning, breaking and rebuilding programs, ideas and concepts to develop the next RSA Conference experience. By the end of the three days, we have...

RSA Conference
RSA Conference
Blog Post
  • Malicious attacks targeting a healthcare company’s confidential data are nothing new. The industry has lived under the stringent HIPAA requirements for years and many have made great strides deploying systems to manage and protect their data. What is disturbing, however, is the number of breaches that still occur. A recent example: LifeBridge is just now disclosing a breach that happened in Septem...

RSA Conference
RSA Conference
Blog Post
  • Early Wednesday morning of RSAC US week, we asked a group of co-collaborators to work with us to help improve the diversity of RSA Conference. A broad spectrum of people were represented – some long-term RSAC attendees and some new to information security – all of various ages, genders, geographies, verticals, positions and ethnicities. In exchange for the 90-minute session, we promised the partic...

RSA Conference
RSA Conference
Blog Post
  • The NIST Cybersecurity Framework was released in February 2014. At the 2015 RSA Conference I hosted a peer-to-peer (P2P) session on the framework: Cybersecurity Framework - Adoption Experiences and Opportunities. While the room was full, including participation from NIST - conveyors of the Framework – there were very few people who had implemented the Framework, but many who planned to. Also in at...

RSA Conference
RSA Conference
Blog Post
  • Have you ever had that awkward pause moment when you make a suggestion, and people look at you like you have a third eye? It feels like second nature to me! I don’t consider myself an “events person,” but I’m responsible for one of the world’s largest cybersecurity events. So, imagine the awkward pause moment I had when I suggested we have Monica Lewinsky keynote at RSA Conference. Most people sai...

RSA Conference
RSA Conference
Blog Post
  • This year’s RSA Conference was buzzing. Everywhere you turned, thought-provoking discussions on the security industry’s biggest challenges were taking place. Although the seriousness of this past year’s proliferation of cyberattacks hung in the air, there was no doubt that the mood was upbeat and there was a lot of positive momentum. After taking a breath to process the content and conversations I...

RSA Conference
RSA Conference
Blog Post
  • The notion of a zero trust networks (ZTN) was created in 2010 by John Kindervag, then of Forrester. Kindervag felt that as enterprises moved slowly towards a data-centric world with shifting threats and perimeters, a new concept of what constituted a secure network had to be created. It was ahead of its time and to a degree still is. In a world of zero trust, all network traffic is considered untr...

RSA Conference
RSA Conference
Blog Post
  • At the recent RSA Conference in San Francisco, attendees heard a lot of recognition that the cyber security landscape is in flux. A new generation of technologies that generate unprecedented amounts of data has changed the playing field, as has the rise of artificial intelligence. This has resulted not just in more things to secure and more insight to work with, it also has led to an adversary tha...

RSA Conference
RSA Conference
Blog Post
  • *Warning this post or embedded links may contain spoilers* Note: This is the final post of a five-part monthly series we kicked off in January 2018 to take a look at how technology, topics and trends from the cybersecurity world compare to characters and themes from the blockbuster Star Wars films. We hope you enjoy our blog series in which the Resistance, filled with hope and determination, much ...

RSA Conference
RSA Conference
Blog Post
  • Fundamentally, there are two major reasons why enterprises get breached despite ever-increasing cybersecurity budgets. They are typically related to insufficient proactive intelligent threat analysis and addressing advanced malware as it enters an enterprise computer system or network too slowly. Companies can take up to four months to address critical vulnerabilities and, on average, more than 20...

RSA Conference
RSA Conference
Blog Post
  • Already one-third of the way through 2018 (how did that happen?), many of us are still catching our breath from April in what was a packed month culminating in another great week out in San Francisco at RSA Conference 2018. With so many great discussions taking place last month, we hope all of you were able to take part in the event and come away inspired by our industry, and ready to engage and c...

RSA Conference
RSA Conference
Blog Post
  • Governments of all types have long proven to be challenged in the area of cyber security. Forget the long-standing jokes about government red tape and inefficiency; this isn't about not being able to get it done. It's about years of giving security short shrift. Consider that the United Nations' second annual Cyber Security Index released last summer indicated that just 38 percent of the world's c...

RSA Conference
RSA Conference
Blog Post
  • To address the lack of women in cyber security, a new book is out dealing with that in InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Rethink Press 978-1781332696) by Jane Frankland. In this interesting book, she brings to light detail about the lack of women in the information security field, and the importance the future of information requires...

RSA Conference
RSA Conference
Blog Post
  • P2P4-W04: Infiltration: Successes and Pitfalls of Penetrating Hostile Online Groups Few security professionals choose to take control back from their opponents by bringing the fight to their doorstep. However, by working to infiltrate their groups, organizations are better equipped to combat fraud, discover new malware, or look for specific threats. In all cases, researchers and analysts need to a...

RSA Conference
RSA Conference
Blog Post
  • For the past few years, Asia Pacific and Japan have continued to be a regular target of cyber adversaries. At RSA Conference 2017 Asia Pacific & Japan in Singapore, some of the APT attack cases impacting the region were identified. Key reasons for the Asia Pacific & Japan (APJ) to experience high number of targeted attacks include the region’s high economic growth and the decade-long ongoing terri...

RSA Conference
RSA Conference
Blog Post
  • Data is the new currency and cybercriminals have been incredibly successful at weaponizing tools, techniques and procedures to exploit corporate networks. We have seen this time and time again from Equifax and Home Depot to Uber and Sony PlayStation. These security breaches are not only a considerable expense but also damaging to corporate reputations. In most cases, by the time you react, the dam...

RSA Conference
RSA Conference
Blog Post
  • While much of the world is focused on the privacy developments in Europe, where the General Data Protection Regulation is sucking much of the oxygen from the room, Asia has quietly been very busy, indeed, on the privacy front. Hong Kong hosted the most recent privacy commissioners’ conference; the Philippines data protection authority has quickly grown into new voice on the global stage; and Asian...

RSA Conference
RSA Conference
Blog Post
  • What can we learn from our mistakes in automation and what’s in store for this trend in the future? In 2017 we saw plenty of attacks using a wide variety of methods, striking hard against the poorly-protected. We’re also seeing increasingly secure systems, with attacks that still manage to keep up. As much as our security has improved and continues to improve in line with increases in computing po...

RSA Conference
RSA Conference
Blog Post
  • It's hard not to return from the RSA Conference and not think of that whole "firehose of information" metaphor tech folks love to trot out. Because that's what the RSA Conference quite literally is: a firehose of information. Whether you get there early to take advantage of pre-conference tutorials, prefer to start things off with the annual Innovation Sandbox Contest, or arrive just in time to ca...

RSA Conference
RSA Conference
Blog Post
  • While the shortage of skilled cybersecurity practitioners has been well-documented for several years, it is important to understand the contours of the skills gap for a more constructive view of how enterprises can best move forward. ISACA’s recently published State of Cybersecurity 2018 research has pinpointed specific themes that are impacting enterprises’ cybersecurity capabilities, both global...

RSA Conference
RSA Conference
Blog Post
  • The Financial Services industry tends to be at the cutting edge of technology, and as a result, is often the group to be ahead of the curve of both its benefit and hazards. Whether it’s faster transactional processing in support of gaining even the slightest edge in trade execution or leveraging big data to gain unprecedented insights, financial services is the place to be. On the other hand, the ...

RSA Conference
RSA Conference
Blog Post
  • RSAC 2018 Friday Recap and Looking Ahead to RSAC Unplugged London and RSAC Asia Pacific & Japan What a memorable Conference week! And there’s no better way to close it out than with the latest installment of “The Hugh Thompson Show”. It’s hard to think of a technology impacting more industries – including InfoSec – than Artificial Intelligence. From pure excitement over its disruptive potential, t...

RSA Conference
RSA Conference
Blog Post
  • As 50,000 members of the cyber security community descended upon San Francisco for the annual RSA Conference to discuss solutions to the security questions facing us, 34 technology companies revealed that they plan to start doing something. In signing the so-called Cybersecurity Tech Accord, Cisco, Facebook, Microsoft and 31 other companies have pledged to "defend all customers everywhere from mal...

RSA Conference
RSA Conference
Blog Post
  • RSAC 2018 Thursday Recap & Friday Preview: Girls Who Code, RSAC 2018 Bash and The Hugh Thompson Show Depending on when you’re reading this, you may be either heading to this year’s RSAC Bash or recovering from it! You might be reflecting on the week so far and hopefully you got a chance to attend Wednesday’s keynote session from the founder and CEO of Girls Who Code. Reshma Saujani recounted her p...

RSA Conference
RSA Conference
Blog Post
  • RSAC 2018 Wednesday Recap & Thursday Preview: Session Highlights, College Day, and the 2018 Bash Are you worn out yet or do you still have an appetite for inspiring, informative, relevant and timely information security content? Well, you’ve come to the right place because it was a great day three at the Conference. Let’s recap. With over 20 topics and tracks, from Analytics, Intelligence and Resp...

RSA Conference
RSA Conference
Blog Post
  • We are pleased to announce the recipients of RSA Conference’s annual awards. The awards winners were officially recognized on Tuesday in San Francisco on site at RSA Conference. The awards include: Excellence in the Fields of Information Security, Mathematics, Public Policy and new for 2018, the Award for Excellence in Humanitarian Service. This year’s RSA Conference Awards winners have shown what...

RSA Conference
RSA Conference
Blog Post
  • RSAC 2018 Tuesday Recap & Wednesday Preview: The Cryptographers Panel, Department of Homeland Security, Upcoming Keynotes and More Tuesday was the first chance of the week for attendees to hear from this year’s keynote speakers and they did not disappoint. For the much-anticipated Cryptographers' Panel, moderator Dr. Zulfikar Ramzan, Chief Technology Officer, RSA was joined onstage by famed indus...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.