919 Results for:RSA
- Sort by:
Women in cybersecurity discuss hiring, advice and being mentors
23 Apr 2018A panel of women cybersecurity professionals at the RSA Conference discussed ways to find the best job candidates, the best advice they've received and how to be better mentors. Read More
Schneier talks cyber regulations, slams U.S. lawmakers
19 Apr 2018Speaking at RSA Conference 2018, Bruce Schneier slammed U.S. lawmakers and Facebook in discussions on internet security regulations and technology policy. Read More
Paul Kocher weighs in on Spectre flaws, vulnerability disclosure
18 Apr 2018At RSA Conference 2018, Paul Kocher, who co-discovered the Spectre flaws, discussed the chip vulnerabilities and explained why disclosure and mitigation efforts were so troubled. Read More
What cybersecurity consolidation means for enterprises
31 Jan 2023Experts predict cybersecurity consolidation will increase in the months and years ahead. Security leaders should consider what that means for their purchasing strategies. Read More
Updating TLS? Use cryptographic entropy for more secure keys
15 Jan 2019Cryptographic entropy is necessary to secure session encryption keys in TLS 1.2, but RSA key transport is not supported in TLS 1.3. Discover the causes for concern with Judith Myerson. Read More
RSAC 2018: Special conference coverage
11 Apr 2018Find out what's happening at the information security industry's biggest event with breaking news and analysis by the SearchSecurity team at the RSA Conference 2018 in San Francisco. Read More
Google rolls out passkeys in service of passwordless future
03 May 2023Google referred to its new passkey option, which features facial recognition, fingerprint and PIN-based authentication, as 'the beginning of the end of the password.' Read More
How network automation scripts will affect veteran engineers
08 Mar 2018This week, bloggers look at how engineers will need to adapt to changes such as network automation scripts, offer projections for RSA 2018 and debate network transformation. Read More
Data masking vs. data encryption: How do they differ?
02 Aug 2022Discover how the data security techniques of data masking and data encryption compare, while also learning about different types of both and their use cases. Read More
Growth mindset lets Microsoft love Linux
20 Apr 2018Timed to coincide with the RSA security conference, Microsoft has announced Azure Sphere, a new solution for creating highly-secured, Internet-connected microcontroller devices. But there's a bit ... Read More