In Pictures: Check out RSA minus the booth babes
The world’s largest security show is operating under a booth babe ban, leaving exhibitors to stretch their imaginations to get more visitors to stop by.
24 Apr | View galleries
Does your department or agency have a bird’s eye view of the company network or is its activity viewed ‘through a glass darkly’?
Albert Kuo | 23 Sep | Read more
Alphabet's Chronicle launches Backstory, a cloud-based threat hunting service that promises cheaper storage and longer retention of threat data.
Enterprise customers can now tap Microsoft experts in a cyber security emergency.
Security practitioners weigh in on the 15 worst data security breaches in recent memory.
Taylor Armerding | 14 Jun | Read more
Australian IT experts are struggling to secure increasingly complex networks and increasing compliance pressure isn’t providing enough incentive for change, a security expert has warned as looming breach-notification legislation threatens to publicly expose poor risk management practices and their consequences.
David Braue | 08 Jun | Read more
It had to be a bit of a jolt for more than 500 exhibitors and thousands of attendees at RSA Conference 2015 last month, all pushing, promoting and inspecting the latest and greatest in digital security technology: The theme of RSA President Amit Yoran's opening keynote was that they are all stuck in the Dark Ages.
Taylor Armerding | 23 May | Read more
No company wants to be associated with a data breach, but if your systems are compromised the fallout can sometimes be more damaging than the act itself.
Matt Rodgers | 22 Sep | Read more
What Boards Want to Know and CISOs Need to Say Seven years ago in the SBIC report Bridging the CISO-CEO Divide, we explored the best practices security leaders could use to communicate more effectively with their COs. CISOs were at a crossroads and just beginning to take a seat at the executive table. We provided recommendations from global leaders about ways CISOs could embrace their growing leadership role, build trust with the executive leadership team and earn the confidence of their CO. We discussed how harting a new course based on a strategic, risk-based approach to information security would drive clear business value.