Cloud Security Falls Short ... But Could Be Great A combination of immature security tools, weak partnerships, and a lack of strong commitment to security leaves cloud service firms short of providing strong protections
Google Security Vulnerability Allowed Two-Step Verification Bypass Researchers at Duo Security detailed an attack that could have allowed a hacker to hijack a user's Google account
RSA, Juniper Team Up In Threat Intelligence-Sharing Intelligence-sharing among vendors--and about attacks on vendors--key to thwarting today's attacks, officials say
Businesses Feel Impact Of IT Security Skill Shortage, Study Finds (ISC)2 workforce study shows lack of cybersecurity personnel, resources affects bottom line
More Improvements To SIEM Than Big Data For big companies looking to spend big budgets, the Big Data pitch for security information and event management (SIEM) systems is a good fit. But other improvements are on the way
Blog: You're A Piece Of Conference Meat Every year folks get hacked off about seeing booth babes at big industry shows. Yet, it seems too many don't understand why these ladies are there and how to disrupt these marketing tactics
Blog: RSA: What To Watch For And What Vaccinations To Get Before Rocking The Casbah Pro tip: It's not threats, it's not capabilities -- it's integration
Keynote Sessions Keynotes include "Big Data Transforms Security," by EMC/RSA's Arthur Coviello, Jr.; "Making a Case for Security Optimism," by Microsoft's Scott Charney; and "Building a Higher Order of Security Intelligence," by Symanetec's Francis deSouza. Debate: Internet GUN CONTROL -- Are Pentesting Tools Good Or Evil? Penetration testing tools allow users to assess the vulnerable state of their IT platforms. Some say that they are useful, while others assert they are detrimental for the overall health of the Internet. Come hear the debate and weigh in with your own opinions.
Expo Pub Crawl Participate in this 1 hour Pub Crawl! Visit sponsoring companies, get your badge scanned, and learn about their latest products, services, and innovations.
| |
Insecurity With Java In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?
A Guide To Security And Enterprise Directories Enterprise directories can be used in a number of ways to tighten and extend your organization's security. In this report, we examine enterprise directories -- through the lens of Microsoft Active Directory -- and their potential as a solution for a wide array of security initiatives.
The Secret World Of Compliance Auditors Smart companies treat compliance auditors not as the enemy but as a knowledgeable resource. In this report, we examine the inner workings of compliance auditors and recommend ways to work together to achieve a successful audit.
Making Insiders Foot Soldiers In Enterprise Security Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage -- especially when it comes to intellectual property theft. In this retrospective of recent Dark Reading coverage, we look at the hot trends and tips on how to flip the equation on the insider threat.
| |