RSA Conference 2013 Coverage
Live from RSA Conference 2013, CRN brings you the latest information security news and exclusive insights on cyber terrorism, mobile device security, cloud security and a ton of new security products.
![]() |
---|
RSA Conference bills itself as the event "where the world talks security," and given the threat landscape IT is currently facing, there should be plenty to chat about at this year's show. Just this past week, three major social media sites, Twitter, Tumblr and Pinterest, were all hit with significant data breaches. Sprinkle in the security complications that come with BYOD and the cloud, and a week hardly seems like enough time to take in all of the issues facing the security industry.
CRN is of course here to give it our best shot, checking in from San Francisco with news and exclusive analysis of all of the sessions and product announcements relevant to the channel. Be sure to bookmark this page for CRN's up-to-the-minute coverage of RSA Conference 2013.
Let's face it: Security vendors are getting weird when it comes to marketing their wares, and this year at RSA was no exception. CRN walked the show floor and found 10 scenes that were truly strange. Five top security researchers reveal their picks for the smartphone platform they believe is the most secure. The RSA security is a chance for security vendors' marketing teams to go hog-wild, and at this year's show, they did just that. Big data security is fast emerging as the buzzword du jour. Government and private industry must work together to combat cyberthreats, FBI director tells RSA Conference attendees. A panel of security experts at the RSA Conference reveal that on the black market, the value of medical identification information is 10 to 15 times greater than financial information. Verizon's 2013 Data Breach Investigations Report, which has been the go-to document for a wealth of attack data, has been tilted toward financially motivated cybercrime. A dozen new sources will increase its visibility into targeted attacks and intellectual property theft. President Obama's cybersecurity executive order could force a limited number of businesses to make improvements to their security postures, but the vast majority of any security best practices will be voluntary, say several former and current government officials at the 2013 RSA Conference. Big data security analytics will help organizations keep pace with adversaries and in many instances get ahead of them, but no security model is a panacea, said RSA executive chairman Art Coviello in a keynote kicking off the 2013 RSA Conference. Speaking at the Cloud Security Alliance Summit at RSA Conference 2013, DHS' Mark Weatherford said the security industry needs to stop relying on outdated technologies and create new ways to address system vulnerabilities, threat detection and authentication. From third-party data breaches to offensive security and dangerous attack techniques, here's a rundown of a handful of RSA Conference sessions that will pique your interest. An (ISC)2 survey of more than 12,000 information security professionals finds that most of them are under pressure to hire skilled talent in the wake of growing concern over hacktivism and targeted attacks. |
From scrubbing memory of data to leaving a phony trail in malware code, some attackers are upping the ante when it comes to hacking into systems and stealing corporate data or controlling processes, say security experts who outlined the threat trends at the 2013 RSA Conference. CERT details how malicious insiders have sabotaged computer networks, stolen confidential corporate information and installed malware. Some companies are ripping out appliances because complexity and a host of poorly configured devices are contributing to the data breach epidemic, say a group of security experts. In an interview with CRN less than one day into his new role, Mike Valentine says he will bring his own philosophy to Sophos' channel organization while he seeks to reignite business with North American VARs. Google and Facebook feel they've been unfairly maligned in the online privacy debate, while Microsoft and Mozilla are using Do Not Track to protect users. At RSA, the two sides met face-to-face. Bruce Schneier, CTO at BT Managed Security Solutions and an all-around security superstar, compares the current state of online services to the age of feudalism -- and guess who the serfs are? Despite ongoing challenges in the security industry, Microsoft's Scott Charney cites reasons for optimism. Despite ongoing challenges in the security industry, Microsoft's Scott Charney cites reasons for optimism. Network security appliance vendors are adding new features that could provide better protection from targeted attacks, sophisticated malware and zero-day exploits. Fledgling security vendors vie for the title of most innovative company at RSA Conference 2013 as part of the event's Innovation Sandbox program. The security industry's largest conference will focus on security fundamentals and risk-based decisions. But, mobile security and big data analytics will take center stage at RSA as well. |
---|
