ISSUE 52.5 (February 2017)
RSA Conference 2017
ISSUE 52.5
Issue 52.5 Contributors

Featured vendors include:

  • Absolute
  • AlienVault
  • Armor
  • Bitglass
  • DigiCert
  • Dome9
  • Easy Solutions
  • Kentik
  • Nehemiah Security
  • Ntrepid
  • Capsule8
  • Cybereason
  • iovation
  • InfoArmor
  • NTT Security
  • Qualys
  • Skycure
  • ThreatQuotient
  • TopSpin Security
  • Vera

RSA Conference 2017

PDF download
Read issue 52.5 now

Table of contents

A record number of more than 43,000 attendees experienced RSA Conference keynotes, peer-to-peer sessions, track sessions, tutorials and seminars.

“Leading up to RSA Conference 2017 it could have been argued that this event was the most anticipated in our history,” said Linda Gray Martin, Director & General Manager of RSA Conference. “Over the last few months information security has experienced both tremendous highs, and weathered scrutiny of lows as experts in private and public sectors debated various practices of information sharing. As a result of this increased exposure, it was critical to have an RSA Conference full of constructive dialog, discussion and debate that will form the information security agenda and continue to move our industry forward. We hope our attendees took this powerful opportunity as the chance to help forge a future we can all be proud of.”

“This year’s RSA Conference challenged a big industry audience to think small. Small are the attack surfaces of security cameras, home routers, and mobile devices increasingly populating our office and home work environments. Small are the diverse data transactions that require innumerable protective measures. Big are the shifts in thinking that require us to think of ourselves as small players inside a vast ecosystem of solution providers. Thinking small is the first step in working together more effectively, and having a big impact with better outcomes,” said Chris Young, General Manager and SVP, Intel Security.

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue