RSA Conference 2012
The RSA conference brings together security experts, vendors, and IT leaders to debate the thorniest issues in information security. Our InformationWeek editorial team will be there to provide you with up-to-the minute news, analysis, and commentary. Our special coverage will also round up stories from our sister publication, Dark Reading.
RSA Preview: 5 Hot Security WorriesFrom securing mobile devices to spotting and stopping APTs and hacktivists, here's what's keeping security managers awake at night--and what will dominate discussion at the upcoming RSA conference.
Advertisement
In Depth Reports
-
Research: State of the IT Service Desk
Infrastructure changes, customer satisfaction, process improvement, service-level achievement, performance management, cost reduction, security… Historically, these topics have dominated IT support managers’ day-to-day routines. Traditional IT service and technical support responsibilities and methodologies are on the edge of obsolescence. -
Will IPv6 Make Us Unsafe?
We see security as a major stumbling block in enterprise migrations from IPv4 to IPv6. For starters, the code is mostly untested, and too few of our current network security products support IPv6, something the black hat community is banking on. -
Database Defenses
Data breaches cost U.S. companies $214 per compromised customer record last year, according to the Ponemon Institute. The average total per-incident cost in 2010 was $7.2 million. Beyond the tangible costs, brand damage can be significant as well, though it is hard to quantify. -
Best Practices: 5 Security Tools Every Small Business Must Have
SMBs may not have the IT resources that their bigger peers do, but they do have the same responsibilities when it comes to security. Fortunately, SMBs can build a strong security posture using a few key products, many of which are free. In this report, Dark Reading examines the challenges that SMBs face when it comes to security and recommends the five security tools every SMB must have. -
Windows 8 Survival Guide: OS and Browser Security
Windows 8 continues the work that Microsoft undertook with Windows 7: to build a more secure operating system and browser from the ground up. The new OS makes significant changes around application controls to limit the fallout of exploits. It also offers improved password management tools, a beefed-up anti-malware package and more encryption options.