Women in Tech: Exploring the Benefits of Diversity in Cybersecurity with...
RSA’s Chief Strategy Officer Niloofar Razi Howe has spent more than 25 years working in for or investing in technology companies, with a focus in the past decade on the security industry. We sat down...
View ArticleGetting Ready for RSA Conference 2016: The New Discover Pass & More
Before you know it, we’ll all be in San Francisco for this year’s RSA Conference. For those of you that are still making your travel plans and trying to sort out your schedule, we’d like to highlight...
View ArticleYour Security Resolutions for 2016
We start the New Year with the best of intentions. We're going to join an ISAC and work out every day; consume only healthy and organic data; clean out our overstuffed Hadoop clusters and get rid of...
View ArticleWeekend Reading: Microsoft Silverlight and the Internet of Things
We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the...
View ArticleEncryption Rules Only Apply to Those Who Follow Them
The world can be a dangerous place, and nations around the world must be vigilant to identify and prevent attacks from would-be terrorists. In the wake of recent terrorist attacks in Paris and in San...
View ArticleEssential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Anyone who has spent time in the information security industry knows what while there is good data around; there is a lot to be desired in terms of empirical and measurable information security data....
View ArticlePragmatic Dysfunction
By Rich Mogull, analyst and CEO of Securosis. I believe that nearly all of information security can be summed up by a single line from the venerated film Men in Black: "A person is smart. People are...
View ArticleCybercrime and Threats Are Growing in 2016
This post in our VC-series comes from Alberto Yépez and Don Dixon, managing directors of Trident Capital Cybersecurity. It’s a new year, and we are poised again for another round of malicious, often...
View ArticleThe Reality of Our Registration Twitter Promotion
As some of you may have seen, a social media plug-in to our encrypted Conference registration system had some of our attendees concerned we were collecting Twitter passwords in our databases. RSA...
View ArticleWeekend Reading: Snowpocalypse Edition
We know your work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. We bring you the best news and analysis from the...
View ArticleSecurity Planning for the Year Ahead: Are You Hoarding Big Data?
Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the...
View Article2016 Is the Year of Developer-Driven Security
In the past 10 years or so, the security industry has gone through a number of paradigm changes, most of which were propelled by fundamental shifts in infrastructure or application-related...
View ArticleThe Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 1:...
This is the first in a series. You can read the second and third parts here. Last May, I wrote a blog post in response to my daughter’s question “what’s the RSA Conference about, Daddy?” Being a...
View ArticleData Privacy Day: Your Customers Care About Privacy
It’s Data Privacy Day. Do you know what your customers think about the way you collect their data? January 28, 2016, marks the ninth annual Data Privacy Day, an international event that hopes to...
View ArticleCatching Up With Martin Fink
Martin Fink is Executive Vice President, Chief Technology Officer and Director of Hewlett Packard Labs, the company’s exploratory and advanced research group. In advance of RSA Conference 2016, we...
View ArticleThe Evolution of InfoSec Through 25 Years of RSA Conference Sessions, Part 2:...
Welcome to the second post in a series exploring the evolution of the information security industry through the lens of RSA Conference sessions. The first one’s here if you missed it and need some...
View ArticleCatching Up with Cisco’s Martin Roesch
Martin Roesch, Vice President and Chief Architect for Cisco Security Business Group, is responsible for shaping the technology strategy and design of the company’s security portfolio and also oversees...
View ArticleExpanding the Reach of RSA Conference
Many of you have been asking the question: why is the cast of CSI Cyber taking the stage this year? Why are they keynoting over someone more ingrained in the industry? As we celebrate our 25-year...
View ArticleThe Securosis Guide to the RSA Conference 2016: The FUD Awakens!
It's a bit hard to believe, but our little Securosis Guide to the RSA Conference turns 7 this year. And the RSA Conference folks are throwing our guide a party, with tens of thousands of their closest...
View ArticleMaximize Your RSA Conference Journey: Be Sure You See What's New in 2016
With RSA Conference just four weeks away, I can very confidently promise the best content yet. Our speakers and facilitators have been hard at work developing their materials, and our Program...
View Article
More Pages to Explore .....