ISSUE 57.5 (May 2018)
RSA Conference 2018
ISSUE 57.5
Issue 57.5 Contributors

Featured vendors include:

  • Absolute
  • Anomali
  • Capsule8
  • CoSoSys
  • Fortanix
  • Micro Focus
  • Onapsis
  • Qualys
  • ThreatQuotient
  • Vera

RSA Conference 2018

PDF download
Read issue 57.5 now
Share

Table of contents

RSA Conference, the world’s leading information security conferences and expositions, concluded its 27th annual event in San Francisco on April 20, 2018.

More than 42,000 attendees experienced keynote presentations, peer-to-peer sessions, track sessions, tutorials, expo floors and seminars during the course of the week focused on topics such as artificial intelligence, data privacy, gamification, the history of technology and innovation, among others. Records were set with the number of exhibitors in attendance along with overall number of sessions.

“The goal of RSA Conference is to bring the best content the cybersecurity industry has to offer across numerous platforms,” said Linda Gray Martin, Director & General Manager of RSA Conference. “We succeeded, in a week filled with knowledge sharing, collaboration and the exchange of innovative ideas among the industry’s elite. In the process, we’re beginning the journey to reach and educate a new audience through RSAC onDemand. We thank everyone for making it such a special event once again and we’re excited to further these conversations in the year ahead.”

(IN)SECURE Magazine archive

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue

    ISSUE 63(September, 2019)

    • Identifying evasive threats hiding inside the network
    • Inside the NIST team working to make cybersecurity more user-friendly
    • Report: Black Hat USA 2019
    • Healthcare’s blind spot: Unmanaged IoT and medical devices
    go to issue