This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Last week, I spoke at the C2 conference in London. The C2 conference is an invite-only threat intelligence conference run by the team at SE Labs. The core themes of the event were timely and provoked interesting discussion: artificial intelligence, supply chain security, and cyber hygiene.
It wasn’t a “Day of Anger” as Qualys used the final leg of its multi-city conference series to discuss the control of edge assets. The post Qualys SecurityConference 2022: Corralling horses in an expanding edge rodeo appeared first on TechRepublic.
At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes. The post WithSecure launches ‘outcome-based’ security at Sphere23 conference appeared first on TechRepublic.
Last week, I attended the AV Comparatives conference in Innsbruck, Austria. This conference brought together many cybersecurity vendors, particularly those with a European focus, as well as a few non-profits, academic institutions, and analyst firms.
The conference, the first after Broadcom’s acquisition of VMware, highlighted the growing trend of companies bringing workloads back from public clouds to on-premises environments. VMware Explore 2024 Broadcom bolsters VMware Cloud Foundation Nov. 1, 2024: V Mware increased the vSAN capacity in vSphere Foundation by 2.5x
The transformative impact of artificial intelligence (AI)and, in particular, generative AI (GenAI)emerged as a defining theme at the CSO Conference & Awards 2024: Cyber Risk Management. Throughout the event, participants explored how AI is fundamentally altering the way enterprises approach security challenges.
The organizers of the popular securityconference, RSA, which drew over 36,000 people to San Francisco in February, confirmed that at least two people who attended have tested positive for COVID-19.
Cisco and Nvidia have expanded their partnership to create their most advanced AI architecture package to date, designed to promote secure enterprise AI networking. The Secure AI Factory, which the vendors announced at Nvidias GTC AI Conference going on this week in San Jose, Calif.,
When it comes to protecting data-center-based resources in the highly distributed world, traditional security hardware and software components just aren’t going to cut it. To read this article in full, please click here
Facebook is the latest tech company to cancel or withdraw from a conference as tech trade shows around the globe are impacted by novel coronavirus (COVID-19). Here's what you need to know.
Simplifying security options for enterprise customers is a daunting task, and it can be even harder in the current pandemic-driven workforce environment. But Cisco is taking steps to both streamline and bolster its security menu, according to news out of its virtual Partner Summit conference.
This week, I attended IBM’s fifth annual Security Summit in New York City, an exclusive event for a who’s who of IBM’s security customers. This is my third year attending, and I always look forward to going for a few reasons: 1) This is a small, targeted half-day securityconference — perfect for a forced […].
As 40,000 attendees descend on San Francisco for the annual security pilgrimage that is the RSA Conference, more sponsors pull out of the event citing safety concerns over the Coronavirus (Covid-19) Pandemic.
VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference.
Dell Technologies introduced new hardware products and services at two separate conferences, the Supercomputing 24 show in Atlanta and Microsoft’s Ignite conference. Dell announced two server products, the PowerEdge XE7740 and PowerEdge XE9685L, as well as updates to its Integrated Rack 5000 (IR5000) series.
The annual RSA Conference (RSAC) is taking place next week in San Francisco and will welcome thousands of security practitioners from all over the world. Securityconferences like RSAC are valuable sources of learning, networking, and inspiration for security leaders and their teams.
Verizon is the latest to withdraw from the RSA conference in San Francisco as tech trade shows around the globe are impacted by the Novel Coronavirus (COVID-19). Here's what you need to know.
In prior years, the RSA Conference focused on themes such as – Zero Trust, geopolitical risk, and automation. While those themes were still present at this year’s conference, it was harder to discern one dominant central theme for the conference. This year’s RSA conference suggested that the industry […].
RSAC gives security startups two structured opportunities to distinguish themselves, and Forrester always finds it revealing to see which startups make the cut.
Key topics analysts anticipate for these securityconferences include supply chain attacks, Microsoft Exchange vulnerabilities and the iPhone/Pegasus spyware incident.
My RSA Conference schedule is set, and I’ve stocked up on hand sanitizer. Here’s my game plan: · Look for innovation in data security. Counting down the days! I keep coming back to “the basics” of understanding data and context about data, which isn’t so basic or easy.
Security, AI, and network-as-a-service (NaaS) were top of mind for Aruba Networks execs at their Atmosphere customer conference this week. Ten years ago for most network operators their main job was making sure connectivity was reliable and security was someone else’s problem. To read this article in full, please click here
Waiting for the RSA Conference is a bit like counting down the days until Christmas. And RSA with a full conference pass is the security and risk version of the Toys “R” Us Big Toy Book but better– my only limits are good time management, a realistic assessment of logistics, and a pair of comfortable […].
The conference, hosted by Columbia University, brought together CISOs, lawmakers, academics, and businesses to discuss GDPR, CCPA, and data privacy in all its forms.
The event, “Russian Disinformation: Tactics, Influence, and Threats to National Security,” showcased various methods the nation-state allegedly uses to disrupt western societies.
The Forrester security and risk team had 11 attendees at the RSA Conference last week. RSAC 2023 is a wrap! We really enjoyed meeting with clients and colleagues old and new — and now we’re *exhausted.* It’s no mystery why; as a team, we collectively participated in over 230 meetings and took more than 1.5 […]
I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019. Here’s a further elaboration of one of my favorite […].
RSA Conference is an incredible opportunity for vendors to showcase their products and services to the security and risk community. Vendors, my shopping list does not include vaporware or snake oil. Everyone attending knows the internet is a scary place and threats are around every digital corner.
The networks that enable today’s hyper-distributed enterprises face persistent and emerging security challenges. So now, one of our hot topics is how to detect such fraud – our API security team is all over it right now,” Anderson said. But that’s not a simple task for security practitioners. “The
The RSA Conference is upon us again, and many are planning their travel to San Francisco next week and determining which talks to attend (including talks from our own Heidi Shey, Jinan Budge, Jeff Pollard, and Joseph Blankenship). But no trip to the RSA Conference is complete without a stroll through the Moscone Center to […]
F5 Networks has rolled out an integrated, cloud-based security platform and services aimed at protecting widely distributed enterprise applications. How to build a hybrid-cloud strategy. To read this article in full, please click here
There’s been a lot of talk over the past few years about a shortage of skilled cybersecurity talent , but from where we sit at the NYC DOE Division of Information and Instructional Technology (DIIT), we see budding security pros all around us. It’s been our privilege to foster the next generation of cybersecurity professionals.
All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.8 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black. VMware said during its quarterly financial call this week it would spend about $2.7
Presenters from GitHub and Intel tell VulnCon conference audience that users and developers must work in tandem to address vulnerabilities in increasingly popular open source software.
CISOs from Twitter, United Airlines and a Bain Capital partner discuss how to integrate security into all aspects of an organization at Rubrik's FORWARD conference Tuesday.
Competing among the 4,500 athletes in the 17 th Summer Paralympic Games was Melissa Stockwell, a three-time World Champion in the sport, and a keynote speaker at the upcoming CSO Conference & Awards. The event – in which athletes swim, cycle, and run – is taxing, and Stockwell was up to the challenge.
Last years Evolve conference showcased practical use cases for AI, an area where Trace3 has developed significant expertise. During the conference, CISO David Gahagan discussed how these moves have helped UTIMCO manage and secure confidential information.
Last week, CrowdStrike held its yearly user conference, Fal.Con, in Las Vegas. The conference comes just two short months after CrowdStrike issued a config update that took down 8.5 million Windows endpoints, which disrupted air travel, hospitals, and media outlets while impacting many other industries.
Discover the latest in Zero Trust and cloud-native security at the Multi-Cloud Conference The post Advancing Zero Trust: Insights From the Multi-Cloud Conference appeared first on Spiceworks.
He provided the details during his keynote at the companys GTC AI developer conference, being held this week in San Jose, California. The company also teamed up with Cisco on Cisco Secure AI Factory, which combines Cisco networking and security gear with Nvidia DPUs, and third-party storage options.
VMware by Broadcom has unveiled a new networking architecture that it says will improve the performance and security of distributed artificial intelligence (AI) — using AI and machine learning (ML) to do so. and the top response, ahead of cyber security, was supporting AI workloads. “One That’s where VeloRAIN will come in. “By
In addition, the homegrown Graviton processor powered more than 250,000 CPUs during Amazon Prime Day, showing its efficiency in handling demand, according to a presentation at the recent AWS: reInvent conference by Dave Brown, vice president of AWS compute & networking services.
From star-studded appearances to dozens of keynotes, panel discussions and workshops, the tech industry’s biggest securityconference offered no shortage of content.
This award-winning access management project uses automation to streamline access requests and curb security risks. Altogether, these automation tools have improved both security and efficiency,” he says. This has saved a lot of time while also making the interactions more secure.”
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content