ISSUE 49.5 (March 2016)
RSA Conference 2016
ISSUE 49.5
Issue 49.5 Contributors

Featured vendors include:

  • Acunetix
  • Anomali
  • Balabit
  • Barracuda Networks
  • CoSoSys
  • Cyphort
  • DB Networks
  • iovation
  • ISACA
  • ISE
  • Qualys
  • PhishLabs
  • Rapid7
  • RSA Security
  • Security On-Demand
  • Solutionary
  • Terbium Labs
  • ThreatQuotient
  • TITUS
  • Twistlock
  • Vera

RSA Conference 2016

PDF download
Read issue 49.5 now
Share

Table of contents

Featured in this magazine are the most important news and companies from the conference, which allows you to get an in-depth look at the highlights of RSA Conference 2016.

A record number of more than 40,000 attendees experienced keynotes, peer-to-peer sessions, track sessions, tutorials and seminars.

Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news.

“RSA Conference continues to be the premier security event, with each event seeing more attendees than ever before, and RSA Conference 2016 was no exception,” said Linda Gray, General Manager of RSA Conference. “Our 25th anniversary marks not only a milestone in the conference’s reach and impact in this important industry, but is also a testament to the work we as a community are doing together. There were a lot of great discussions over the course of the week, and I look forward to the positive impact these will make on our world moving forward. We thank the cybersecurity community for its continued support, innovation, spirit and drive as we shape the future of our industry, together.”

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue