ISSUE 52.5 (February 2017)
RSA Conference 2017
ISSUE 52.5
Issue 52.5 Contributors

Featured vendors include:

  • Absolute
  • AlienVault
  • Armor
  • Bitglass
  • DigiCert
  • Dome9
  • Easy Solutions
  • Kentik
  • Nehemiah Security
  • Ntrepid
  • Capsule8
  • Cybereason
  • iovation
  • InfoArmor
  • NTT Security
  • Qualys
  • Skycure
  • ThreatQuotient
  • TopSpin Security
  • Vera

RSA Conference 2017

PDF download
Read issue 52.5 now

Table of contents

A record number of more than 43,000 attendees experienced RSA Conference keynotes, peer-to-peer sessions, track sessions, tutorials and seminars.

“Leading up to RSA Conference 2017 it could have been argued that this event was the most anticipated in our history,” said Linda Gray Martin, Director & General Manager of RSA Conference. “Over the last few months information security has experienced both tremendous highs, and weathered scrutiny of lows as experts in private and public sectors debated various practices of information sharing. As a result of this increased exposure, it was critical to have an RSA Conference full of constructive dialog, discussion and debate that will form the information security agenda and continue to move our industry forward. We hope our attendees took this powerful opportunity as the chance to help forge a future we can all be proud of.”

“This year’s RSA Conference challenged a big industry audience to think small. Small are the attack surfaces of security cameras, home routers, and mobile devices increasingly populating our office and home work environments. Small are the diverse data transactions that require innumerable protective measures. Big are the shifts in thinking that require us to think of ourselves as small players inside a vast ecosystem of solution providers. Thinking small is the first step in working together more effectively, and having a big impact with better outcomes,” said Chris Young, General Manager and SVP, Intel Security.

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue