The RSA cybersecurity conference once again this year gathered tens of thousands of individuals to network and attend keynotes and briefings on topics ranging from election security and genomics to privacy and cybercrime. Here are 20 visual highlights from this year's event.
The U.S. is better prepared to respond to election interference and related cybersecurity issues than it was four years ago, several security professionals, including one of the FBI's top experts, tell Information Security Media Group.
The attack surface is constantly expanding, with threats continuing to keep pace with the evolution in infrastructure and digital transformation, says Leah MacMillan, chief marketing officer of Trend Micro.
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
The state of endpoint security might appear good at first glance, but look below the surface and the situation may not be as rosy as it seems, says Christy Wyatt, CEO of Absolute, based on her company's new "2020 Endpoint Resilience Report."
Wall Street has been hit by the twin threats of the new coronavirus as well as oil prices plummeting, with the Dow dropping 2,000 points on Monday for its worst day in 12 years. Amidst fears that a recession could tank the global economy, some experts still see upsides for the cybersecurity sector.
As consumers and organizations demand more stringent identity and access management controls, self-sovereign identity management can play a critical role, says Heather Dahl of the Sovrin Foundation.
As cloud-first and cloud-native become more common labels in the industry, organizations are focusing on achieving visibility and operational excellence, says Trend Micro's Wendy Moore.
The California Consumer Privacy Act, the EU's General Data Protection Regulation and other privacy laws are focused on making enterprises and boards of directors more accountable, says Marc Cohen of ePlus Technology, who discusses compliance issues.
Many organizations have leapfrogged from "cloud concerns" to "cloud first" mindsets. What are the implications for encryption and access control in a multi-cloud environment? Lee Waskevich of ePlus and Todd Moore of Thales discuss the challenges and solutions.
There is no more fundamental element in cybersecurity than identity. And in some ways, there's nothing harder to secure. Bil Harmer of SecureAuth calls identity "the last bastion" of cybersecurity, and he's eager to take it on in his new role.
Office365 and SaaS usage are driving a shift away from managing security on premises, necessitating stronger security in the cloud, says Kowsik Guruswamy, CTO at Menlo Security.
Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. And they were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studios.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.