ISSUE 61.5 (March 2019)
RSA Conference 2019
ISSUE 61.5
Issue 61.5 Contributors

Featured vendors include:

  • Anomali
  • Zscaler
  • Netsparker
  • iovation
  • Tripwire
  • Bandura Cyber
  • Brinqa
  • Capsule8
  • CoSoSys
  • Data Theorem
  • DigiCert
  • Gemalto
  • Onapsis
  • Votiro
  • CyberArk
  • Intezer
  • Pulse Secure

RSA Conference 2019

PDF download
Read issue 61.5 now
Share

Table of contents

RSA Conference, the world’s leading information security conferences and expositions, concluded its 28th annual event in San Francisco.

The week saw more than over 42,500 attendees, 740 speakers and 700 exhibitors at Moscone Center and Marriott Marquis, where they experienced the North and South Expo, keynote presentations, peer-to-peer sessions, track sessions, tutorials, seminars and special events on topics such as privacy, hackers and threats, machine learning, artificial intelligence and the human element, law, IoT security, public interest technology, and talent shortages.

“At RSA Conference, we strive to showcase unique content from the world’s top cybersecurity minds, and the latest security solutions, in a way that connects us all, reveals diverse perspectives, and creates a safe space for tackling the tough issues we all face,” said Linda Gray Martin, Director & Chief of Operations of RSA Conference.

“We are proud of our attendees, exhibitors, and speakers that made this goal a reality over the past week. We thank everyone involved for bringing their passion and commitment to improving cybersecurity, and our world, to RSA Conference year after year.”

(IN)SECURE Magazine archive

ISSUE 70(November, 2021)

  • How to develop a skilled cybersecurity team
  • Securing your WordPress website against ransomware attacks
  • How to prevent corporate credentials ending up on the dark web
go to issue

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue