ISSUE 57.5 (May 2018)
RSA Conference 2018
ISSUE 57.5
Issue 57.5 Contributors

Featured vendors include:

  • Absolute
  • Anomali
  • Capsule8
  • CoSoSys
  • Fortanix
  • Micro Focus
  • Onapsis
  • Qualys
  • ThreatQuotient
  • Vera

RSA Conference 2018

PDF download
Read issue 57.5 now
Share

Table of contents

RSA Conference, the world’s leading information security conferences and expositions, concluded its 27th annual event in San Francisco on April 20, 2018.

More than 42,000 attendees experienced keynote presentations, peer-to-peer sessions, track sessions, tutorials, expo floors and seminars during the course of the week focused on topics such as artificial intelligence, data privacy, gamification, the history of technology and innovation, among others. Records were set with the number of exhibitors in attendance along with overall number of sessions.

“The goal of RSA Conference is to bring the best content the cybersecurity industry has to offer across numerous platforms,” said Linda Gray Martin, Director & General Manager of RSA Conference. “We succeeded, in a week filled with knowledge sharing, collaboration and the exchange of innovative ideas among the industry’s elite. In the process, we’re beginning the journey to reach and educate a new audience through RSAC onDemand. We thank everyone for making it such a special event once again and we’re excited to further these conversations in the year ahead.”

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue