Thursday, February 28, 2013

RSA Conference Daily

If you have trouble viewing this email, read the online version.

RSA CONFERENCE  DAILY 
February 28, 2013
RSA Conference Today Brought To You By InformationWeek and Dark Reading
Follow our coverage of RSA on
Facebook Twitter LinkedIn
Top Stories
China's Cyberespionage Will Continue Unabated, Say Experts
The U.S. government will be slow to act against aggressors who attack through the Internet, predict policy and China experts at RSA

Segmentation Can Increase Risks If Firewalls Aren't Managed Well
The multiplication of internal firewalls to comply with regulations and minimize risk to critical databases and applications has created a rat's nest of firewall configuration issues

Latest News
Stuxnet, The Prequel: Earlier Version Of Cyberweapon Discovered
Symantec finds 'missing link' in infamous Stuxnet malware that sabotages another piece of equipment in Iranian nuclear facility--attackers became more aggressive as campaign ensued

Cloud Security Falls Short ... But Could Be Great

A combination of immature security tools, weak partnerships, and a lack of strong commitment to security leaves cloud service firms short of providing strong protections

Google Security Vulnerability Allowed Two-Step Verification Bypass
Researchers at Duo Security detailed an attack that could have allowed a hacker to hijack a user's Google account

RSA, Juniper Team Up In Threat Intelligence-Sharing
Intelligence-sharing among vendors--and about attacks on vendors--key to thwarting today's attacks, officials say

Today's Events
Special Government Sessions

"007 or DDOS: What is Real-world Cyber Policy?"; "The FBI and the Private Sector: Safeguarding Our Cyber Security"; and "Ten Years Later: The National Mission to Secure Cyberspace."

Debate: RSA Conference Rump Session

For the uninitiated, a Rump Session is a mosh-pit of passionate and ruthlessly short talks, usually on enlightenment found while at the Conference, and/or humor. The audience submits talks on the fly, noise makers are used to enforce time limits, and we hope to all benefit from flashes of brilliance delivered tongue-in-cheek.

Keynote Sessions

Includes "Criminal Education: Lessons from the Criminals and their Methods," by HP's Art Gilliland; "The Lifecycle of Cybercrime," by Trustwave SpiderLabs' Nicholas Percoco and U.S. Secret Service Special Agent Erik Rasmussen; and "Mind over Matter: Managing Risk with Psychology Instead of Brute Force," by Akamai's Andy Ellis.

BYTE iPad App

Bit9 Announces Real-Time Endpoint And Network Security Integration Strategy
Company will partner with network security providers

Spirent Adds Support For Malware Testing With Realistic Threat Assessment
Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices

Secunia Enters Mobile Security Market With PSI For Android
Solution scans Android devices for vulnerable apps

HyTrust Wins Major Patents For Automated Cloud Security And Virtual Infrastructure Management
Patents automate risk mitigation and compliance in virtualized infrastructure, and ease adoption of multitenant clouds


Additional Resources

Six Decision Factors For Hardware-Based Authentication
Tokens, smartcards, biometrics, and other hardware-based authentication technologies provide a significant layer of security for sensitive enterprise data. But the wrong choice, or a mishandled implementation, can mean unexpected costs and management overhead, device failure, and user rejection. We explore the pros and cons of the various technologies, and help you choose the right approach for your company.

You've Got (Secure) Mail: Using Service Providers To Boost Protectiont
The SaaS market is still in its infancy, but hosted e-mail security firms are leading the way. Still, these services are not without risks. In this Dark Reading Tech Center report, we'll discuss how to determine what mix of in-house and hosted email security makes sense for your organization.

Finding Vulnerabilities By Attacking Your Own Environment
Vulnerability scans are valuable, but you have to think and act like a hacker if you want to truly understand the ways in which your organization could be compromised. In this report, Dark Reading recommends the tools and methodologies that can be used to test your organization's security.

Five Security Tools Every Small Business Must Have
SMBs may not have the IT resources that their bigger peers do, but they do have the same responsibilities when it comes to security. Fortunately, SMBs can build a strong security posture using a few key products, many of which are free. In this report, Dark Reading examines the challenges that SMBs face when it comes to security.


This e-mail was sent to sojo.blo@gmail.com

As a recipient of the Dark Reading Daily, InformationWeek Security Update, or if you are an RSA attendee, you are receiving this complimentary newsletter "RSA Conference Daily" for a limited time only.

© UBM TechWeb 2013. All Rights Reserved. Published By InformationWeek & Dark Reading, 600 Community Drive, Manhasset, NY 11030.

UBM TechWeb, Dark Reading, InformationWeek, and associated design marks and logos are trademarks owned or used under license by United Business Media LLC, and may be registered in the United States and other countries. Other names mentioned may be the trademark or service mark of their respective owners.

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

No comments:

Post a Comment