For the first time since the event was launched 58 years ago, organizers on Thursday cancelled the Healthcare Information and Management Systems Society Conference, due to the quickly evolving global coronavirus spread.
True or False: Quantum computing will break cryptography as we know it today? RSA CTO Zulfikar Ramzan shares his thoughts and opens up on the trends he sees driving the cybersecurity marketplace in the decade ahead.
What is Big Game Hunting in the cybercrime context, and how are industry sectors being targeted? Jennifer Ayers of CrowdStrike shares insights on this and other trends detailed in 2020 Global Threat Report.
Art Coviello, a partner at Rally Ventures and former CEO of RSA, recently met with a group of CISOs on the topic of presenting to the board. He was surprised - and not in a good way - at what he heard. Here are his tips for talking cybersecurity with senior business leaders.
The Cryptographer's Panel, which sees five cryptography experts analyze and debate top trends, remains a highlight of the annual RSA conference. For 2020, the panel focused on such topics as facial recognition, election integrity and the never-ending crypto wars, while giving shout-outs to bitcoin and blockchain.
The U.K. Information Commissioner's Office has fined Cathay Pacific Airways over a data breach that lasted four years and exposed the personal information of over 9 million passengers and customers, including 111,000 British citizens. The fine could have been larger, but the cyber incident happened before GDPR went...
In a crowded cybersecurity marketplace, it's challenging for newcomers not only to get funding, but also to rise above the noise and get attention. This is where venture capital firms can help, says Don Dixon, co-founder and managing director of ForgePoint Capital.
The human element is a fundamental component of some of the newest cyberattacks that Sophos has been tracking, says the firm's principal research scientist, Chet Wisniewski, who advises organizations to adapt their security and protection plans accordingly.
Technology has enabled a whole new wave of "accidental" insider threats - people who make a mistake or are taken advantage of by attackers. What role can technology now play in improving insider threat detection and response? Three CISOs share their insights.
Federal regulators say newly identified cybersecurity vulnerabilities dubbed "SweynTooth" could pose risks to certain internet of things devices, including wearable health gear and medical devices, as well as "smart home" products from vendors who use Bluetooth Low Energy, or BLE, wireless communication tech.
Three U.S. senators are demanding more answers from Catholic healthcare system Ascension and Google over "Project Nightingale," which is part of a controversial data-sharing and cloud migration initiative that has raised concerns about sharing patient information without explicit permission.
Just as consumers can look at a box of Twinkies and read a list of ingredients, so too should software makers provide users with a "bill of materials" explaining their composition, says Allan Friedman, director of cybersecurity initiatives at the U.S. National Telecommunications and Information Administration.
Software development over the past decade: The good news is that more organizations than ever have secure software development practices in place, says Chris Eng, chief research officer at Veracode. But the bad news is that many of the same flaws - including injection vulnerabilities - persist.