Tuesday, February 26, 2013

RSA Conference Daily

If you have trouble viewing this email, read the online version.

RSA CONFERENCE  DAILY 
February 26, 2013
RSA Conference Today Brought To You By InformationWeek and Dark Reading
Follow our coverage of RSA on
Facebook Twitter LinkedIn

Top Stories
Cloud Security Falls Short ... But Could Be Great
A combination of immature security tools, weak partnerships, and a lack of strong commitment to security leaves cloud service firms short of providing strong protections

Google Security Vulnerability Allowed Two-Step Verification Bypass
Researchers at Duo Security detailed an attack that could have allowed a hacker to hijack a user's Google account

RSA, Juniper Team Up In Threat Intelligence-Sharing
Intelligence-sharing among vendors--and about attacks on vendors--key to thwarting today's attacks, officials say

Latest News
Businesses Feel Impact Of IT Security Skill Shortage, Study Finds
(ISC)2 workforce study shows lack of cybersecurity personnel, resources affects bottom line

More Improvements To SIEM Than Big Data
For big companies looking to spend big budgets, the Big Data pitch for security information and event management (SIEM) systems is a good fit. But other improvements are on the way

Blog: You're A Piece Of Conference Meat
Every year folks get hacked off about seeing booth babes at big industry shows. Yet, it seems too many don't understand why these ladies are there and how to disrupt these marketing tactics

Blog: RSA: What To Watch For And What Vaccinations To Get Before Rocking The Casbah
Pro tip: It's not threats, it's not capabilities -- it's integration

Today's Events
Keynote Sessions
Keynotes include "Big Data Transforms Security," by EMC/RSA's Arthur Coviello, Jr.; "Making a Case for Security Optimism," by Microsoft's Scott Charney; and "Building a Higher Order of Security Intelligence," by Symanetec's Francis deSouza.

Debate: Internet GUN CONTROL -- Are Pentesting Tools Good Or Evil?
Penetration testing tools allow users to assess the vulnerable state of their IT platforms. Some say that they are useful, while others assert they are detrimental for the overall health of the Internet. Come hear the debate and weigh in with your own opinions.

Expo Pub Crawl
Participate in this 1 hour Pub Crawl! Visit sponsoring companies, get your badge scanned, and learn about their latest products, services, and innovations.

BYTE iPad App

Juniper Networks Announces Industry-First Device Level Fingerprinting
Junos Spotlight Secure is cloud-based global attacker intelligence service that fingerprints hackers at the device level

Thales And Ponemon Institute Study Shows Encryption And Key Management Increasingly Viewed As Strategic Issues
Global Encryption Trends Study shows steady increase in the deployment of encryption solutions

Co3 Systems Delivers Security Incident Response In Major Platform Expansion
Provides automated, single-pane incident management in a secure, isolated environment for general security incidents

RSA Launches RSA NextGen Security Operations Services To Help Customers Build Battle-Ready Cyber Defenses
Escalation of cyberthreats is driving organizations to revamp their approach to prepare for, respond to, and mitigate advanced cyberthreats

Additional Resources

Insecurity With Java
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

A Guide To Security And Enterprise Directories
Enterprise directories can be used in a number of ways to tighten and extend your organization's security. In this report, we examine enterprise directories -- through the lens of Microsoft Active Directory -- and their potential as a solution for a wide array of security initiatives.

The Secret World Of Compliance Auditors
Smart companies treat compliance auditors not as the enemy but as a knowledgeable resource. In this report, we examine the inner workings of compliance auditors and recommend ways to work together to achieve a successful audit.

Making Insiders Foot Soldiers In Enterprise Security
Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage -- especially when it comes to intellectual property theft. In this retrospective of recent Dark Reading coverage, we look at the hot trends and tips on how to flip the equation on the insider threat.


This e-mail was sent to sojo.blo@gmail.com

As a recipient of the Dark Reading Daily, InformationWeek Security Update, or if you are an RSA attendee, you are receiving this complimentary newsletter "RSA Conference Daily" for a limited time only.

© UBM TechWeb 2013. All Rights Reserved. Published By InformationWeek & Dark Reading, 600 Community Drive, Manhasset, NY 11030.

UBM TechWeb, Dark Reading, InformationWeek, and associated design marks and logos are trademarks owned or used under license by United Business Media LLC, and may be registered in the United States and other countries. Other names mentioned may be the trademark or service mark of their respective owners.

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

No comments:

Post a Comment