1Luminaries Discuss Hot Security Trends, From Clouds to Hacks, at RSA
by Sean Michael Kerner
2North, South and West Moscone Were Packed With People
Once again, the RSA Conference was held at the Moscone Center in San Francisco, and filled the North, South and West buildings.
3RSA Chief Wants Change
During the opening keynote of the 2015 RSA Conference, Amit Yoran, president of RSA Security, said that much of existing security is broken and change is needed.
4Microsoft Pledged Cloud Transparency and Control
Scott Charney, corporate vice president, Trustworthy Computing, at Microsoft, explained that cloud users want transparency and control, which he said is something that Microsoft is committed to delivering.
5The Security “Halo”
Art Gilliland, HP senior vice president of enterprise security, detailed in his keynote how security continues to be an evolutionary process. As an example, he used the game “Halo,” which added many new features over the years, though the basic gameplay has remained the same.
6Bruce Schneier Discusses Sony Hack
Bruce Schneier’s session covered the effects of the massive Sony hack. Schneier, CTO of incident response management vendor Co3 Systems, said the key for organizations is to be as resilient as possible to be able to withstand cyber-attacks.
7DHS Chief Calls for Less Encryption
Secretary of Homeland Security Jeh Johnson took to the keynote stage at the RSA Conference to explain what the U.S. government is doing in cyber-security, including a new DHS office in Silicon Valley, and why encryption isn’t always a good thing.
8Ratheon Joins With Websense
One of the biggest deals announced at RSA was the $1.9 billion Raytheon acquisition of Websense, whose security expertise will augment Raytheon’s Cyber Product division.
9NSA Shows Up on the Show Floor
The U.S. National Security Agency (NSA) was an exhibitor and provided attendees with information about security and job opportunities.
10FBI Brings a Tommy Gun to RSA
The U.S. Federal Bureau of Investigation also had a booth, with the centerpiece being a Tommy gun.
11Playing Security Whac-a-Mole
Security professionals often consider dealing with hackers to be a game of “Whac-a-Mole.” Security vendor BeyondTrust brought a game machine it called “Whac-a-Hack” onto the RSA show floor to reinforce that idea.
AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...