Tag Archives: cryptography

RSA Conference held at the Moscone Center in San Francisco

RSA 2013 Highlights – Is Big Data The Key To Security?

As I review the week long RSA 2013 conference results, a couple of things stand out for me. First, it was another ‘record attendance’ number with over 24,000 attendees and the event featured over 360 companies from the cyber security industry. Given the growing sophistication of highly visible attacks not only on business and government websites, but now on media such as Twitter and on mobile devices, is it any wonder that the emphasis on security continues to grow? Perhaps the most interesting Read more [...]

RSA 2013 – Security in Knowledge

Every year, there are two aspects of the RSA Conference that capture my attention. First are the new types of threats that are brought out and discussed.  These new threats tend to be taken from the headlines of last year’s top security stories. Mobile security, advanced persistent threat and DDoS attacks on banks are highlighted topics for the upcoming conference – all familiar stories from last year.  Keynote speakers will also be addressing topics such as how Big Data Redefines Security Read more [...]

RSA 2012 Wrap-up – Cyber Threats Are A Bigger Deal Than What You Might Think

Last week’s RSA Conference 2012 was the largest security event ever, with 350 sessions, 350 exhibitors and over 20,000 attendees. There are two very, very good reasons for this ever growing level of interest. In his keynote speech, FBI Director Robert Mueller noted that: “Terrorism remains the FBI's top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country.”  We’ve all read about the large number of successful hacks Read more [...]

RSA 2012 First Impressions

Security for mobile, cloud and social technologies is the big focus at this year’s RSA conference being held at Moscone Center in San Francisco. Topics include everything from mobile device management and individual device protection (e.g. virus protection) to authentication and intrusion tools, new hacking techniques and the latest ideas in intelligence-driven security. The highly visible security breaches of the past year mean that the network providers and application developers at the conference Read more [...]

RSA 2012 Pre-show Musings – Can Our Data Really Be Protected?

A headline in a post on the New York Times technology blog Bits said it all – “Even Big Companies Cannot Protect Their Data.” The story was about a user who had been the victim of 3 cyber attacks in January.  Two of the attacks were against two retailers owned by Amazon (Zappos and 6PM) and the 3rd at eBay. In the case of Zappos, the data that might have been exposed included customer names, encrypted passwords, phone numbers, e-mail addresses and the last 4 digits of credit card numbers. Read more [...]