Conference Connection

ICYMI: AOL data breach, fighting cybercrime, Target CISO and Windows XP

ICYMI: AOL data breach, fighting cybercrime, Target CISO and Windows XP

By

In a roller coaster week which saw AOL report a data breach, Target appoint a CISO and all the madness around Infosecurity Europe, SC looks at all the major stories in our latest In Case You Missed It column.

Raising the barrier to entry for hackers

Raising the barrier to entry for hackers

By

Make hacking more time consuming, difficult and uneconomic if you want to deter intruders, says Kevin Kennedy of Juniper Networks.

Third-party security risks follow Target data breach

Third-party security risks follow Target data breach

By

What should businesses be doing to ensure that contractors and other third-parties are aware of the risks in security? That was one of the key questions during a panel discussion at Infosecurity 2014 in London on Thursday.

BYOD 'explosion' but security caveats exist for CYOD too

BYOD 'explosion' but security caveats exist for CYOD too

By

The Bring Your Own Device (BYOD) trend is already entrenched in many businesses, but some IT departments are trying to regain control - and security - by opting for Choose Your Own Device (CYOD) instead.

CT Expo: indentifying terrorists with digital forensics

CT Expo: indentifying terrorists with digital forensics

By

Digital forensics speed up the digital battle against Al Qaeda indentifying what needs to be translated.

Red Teaming in the real world

Red Teaming in the real world

By

Red teaming is a relatively new type of extended pen testing used to raise the security and governance bar in major corporates, most notably financial service organisations such as banks.

Security needs to look 10 years ahead

Security needs to look 10 years ahead

By

If it is to truly enable businesses, security needs to look now at implications of future developments and explain them to the board in financial terms, suggests the Infosec panel on Monday.

CeBIT 2014 sees Anglo-German cooperation

CeBIT 2014 sees Anglo-German cooperation

CeBIT further sharpened its profile as one of the world's leading IT events for decision-makers, reports Roland Ackermann

The Google cloud: security still a watchword

The Google cloud: security still a watchword

By

I don't believe there are new security problems due to the use of the cloud - Dr. Peter Dickman, engineering manager at Google, speaking at InfoSecurity Europe 2014.

E.U action needed to counter NSA surveillance, says security expert

E.U action needed to counter NSA surveillance, says security expert

By

Mikko H. Hypponen, chief research officer at F-Secure, didn't mix his words when describing the former CIA contractor Edward Snowden and European technology companies in London earlier today.

Reputation the key driver for IT security

Reputation the key driver for IT security

By

If you fail to address the security issue, then you can lose your company bonus, quips Adrian Davies, EMEA MD, (ISC)², at the Infosecurity Europe Show 2014.

KPMG partner calls for privacy protection

KPMG partner calls for privacy protection

By

KPMG partner Stephen Bonner gave a bravura performance at Tuesday's BSides London conference that involved him wearing makeup, wigs and an electric shock device in the cause of protesting against our lack of privacy.

Infosecurity Europe: Are cybercriminals winning the security game?

Infosecurity Europe: Are cybercriminals winning the security game?

By

One of the hot topics at the Infosecurity Europe show - held in London this week - is the scale and complexity of the latest attacks against corporates.

BSides hears call to "respect hackers"

BSides hears call to "respect hackers"

By

BSides offers non-corporate alternative event to the InfoSecurity show, suggests defence replicates hackers' growing specialisations.

EC3: Darknet & cloud the barriers to prosecuting cyber-criminals

EC3: Darknet & cloud the barriers to prosecuting cyber-criminals

By

Troels Oerting, head of European Cybercrime Centre (EC3), spoke about the difficulties of catching cyber-criminals during his keynote speech at the Infosecurity Europe exhibition in London earlier today.

RSA 2014: Time and knowledge key to beating cyber attackers

RSA 2014: Time and knowledge key to beating cyber attackers

By

BH Consulting analyst Brian Honan and Tripwire chief technology officer Dwayne Melancon considered how IT can beat cyber-attackers in a quick-fire presentation at the RSA Conference in San Francisco on Thursday.

RSA 2014: 'BYOD is not going away'

RSA 2014: 'BYOD is not going away'

By

Speakers at this week's RSA Conference in San Francisco stressed that the Bring Your Own Device (BYOD) trend is changing - not ending.

RSA 2014: Sharing data key to beating APTs

RSA 2014: Sharing data key to beating APTs

By

Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.

RSA 2014: CISOs must move beyond perimeter-based security

RSA 2014: CISOs must move beyond perimeter-based security

By

In an age of advanced attacks and insider threats, traditional perimeter-based security just doesn't cut it, argue two leading InfoSec experts.

RSA 2014: The "double-edged sword" of disclosing software vulnerabilities

RSA 2014: The "double-edged sword" of disclosing software vulnerabilities

By

An interesting discussion at the RSA conference revealed that vendors often face a "double-edged sword" when tasked with disclosing software vulnerabilities.

RSA 2014: In the dock - understanding a data breach trial

RSA 2014: In the dock - understanding a data breach trial

By

If you have broken no law, nor failed to comply with any agreed industry standard, are you liable for the consequential loss incurred by your clients if you suffer a data breach that causes them loss?

RSA 2014: Bruce Schneier champions encryption in 'golden age' of government surveillance

RSA 2014: Bruce Schneier champions encryption in 'golden age' of government surveillance

By

Cryptography expert Bruce Schneier, now CTO of Co3 Systems, continued his criticism of the National Security Agency's surveillance during his well-attended talk at the RSA Conference in San Francisco today.

RSA 2014: Experts discuss the state of security education

By

Hord Tipton, Ernest McDuffie and Michael Murray sit down to discuss the state of security education for young people and adults.

B-Sides SF: 'Sexism can be security vulnerability'

B-Sides SF: 'Sexism can be security vulnerability'

By

Security researcher - and white hat hacker - Raven Alder addressed sexism in the InfoSec world at the B-Sides San Francisco event on Monday, and said - perhaps surprisingly - that it can help and hinder attackers and defenders in equal measure.

B-Sides SF: 'You suck at your job'

B-Sides SF: 'You suck at your job'

By

"You suck at your job" was the Michael Roytman's controversial opening line to the audience of white hat hackers at the B-Sides event run prior to RSA San Francisco.

RSA 2014: RedOwl Analytics named "Most Innovative Company" at Innovation Sandbox

By

Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.

B-Sides SF: US government a 'threat' to the future of encryption

B-Sides SF: US government a 'threat' to the future of encryption

By

Christopher Soghoian, of the ACLU (American Civil Liberties Union), concluded his speech at BSides San Francisco with the observation that developers building encryption models need to consider the US government a threat.

RSA 2014: Richard Clarke speaks on rebuilding trust with the NSA

By

Richard Clarke kicked off the CSA Summit 2014 by discussing his observations about the NSA surveillance controversy.

B-Sides SF: Hackers urged to step up and influence legislation

B-Sides SF: Hackers urged to step up and influence legislation

By

Hackers and InfoSec experts need to stand up and become part of a wider plan to influence and reform government legislation on information security, so says Rapid 7 global security strategist Trey Ford.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US