Risk
2/4/2014
10:57 AM
Connect Directly
RSS
E-Mail
50%
50%

RSA Conference 2014: Complete Coverage

Catch up on RSA Conference 2014 with our round-up of articles leading up to, from, and after the event

>> Securing Software Requires Design, Testing and Improvement
Adopting secure development, incorporating frequent testing, and creating measures of software security are important to create more secure code

>> Security Firms Face Crisis Of Trust
Mikko Hypponen reflects on shift toward rampant government spying and use of malware -- and targeted attack attempts on F-Secure

>> Researchers Create Legal Botnet Abusing Free Cloud Service Offers
Hack depends on scripts creating scores of unique email addresses and automating execution of email verification

>> Hacking Critical Infrastructure Companies -- A Pen Tester's View
At the RSA Conference, a pen tester outlines some of the elements of a successful attack on energy companies

>> Supply-Chain Threats Still An Uncertain Danger
With a global manufacturing economy muddying the definition of a foreign product, nations are still hashing out strategies to secure their supply chains

>> Today's Network Security Challenges: No Easy Answers
The BYOD trend and proliferation of mobile devices are making life hard for security teams, but solutions are elusive, panelists say at RSA Conference 2014

>> Headline Here
Dek here

>> Today's Network Security Challenges: No Easy Answers
The BYOD trend and proliferation of mobile devices are making life hard for security teams, but solutions are elusive, panelists say at RSA Conference 2014

>> Fewer Than Half Of IT Pros At RSA Conference Say NSA Went Too Far
Spying revelations and document leaks a big theme at RSA Conference 2014, but views on the controversy are split

>> Big Data A Big Focus Of Security Analytics Products
At the RSA Conference in San Francisco, vendors pitched big the importance of properly leveraging big data to improve security

>> IBM Software Vulnerabilities Spiked In 2013
Most code flaws still involve non-Microsoft products, and overall patching speed has improved, study presented at RSA conference finds

>> More Than 100 Flavors Of Malware Stealing Bitcoins
Specialized form of malware empties electronic wallets of digital currency, and antivirus often misses it

>> Juniper Security Chief Takes Swipe At Security Apathy
Juniper Security Chief Takes Swipe At Security Apathy

>> Coviello: RSA Security's Work With NSA 'A Matter Of Public Record'
RSA chairman calls for global intelligence community reforms, spinning IAD off from NSA

>> Microsoft Beefs Up EMET
Early release of anti-exploit tool shuts down bypass methods created by Bromium Labs

>> NSA Spying Scandal Darkens Cloud Discussions At RSA
From Europe's efforts to create regulations for data localization to worries over the security of the cloud, the leaks of the past eight months have cast a shadow over cloud providers

>> Cisco-Sourcefire Integration Takes Shape
Integration includes adding Sourcefire's AMP technology into its email and Web security appliances

>> Researchers Bypass Protections In Microsoft's EMET Security Tool
Bromium Labs researchers create exploit that the Enhanced Mitigation Experience Toolkit (EMET) 4.1 can't detect

>> Is The Hypervisor Security's Goldilocks Zone?
RSA presentation to put virtualization forward as a tool to fix security's architectural problems

>> Solving The Security Workforce Shortage
To solve the skills shortage, the industry will need to attract a wider group of people and create an entirely new sort of security professional

>> Algosec Partners With Qualys
New integration delivers application-centric vulnerability management, aggregating and scoring vulnerabilities based on risk and continuously monitoring for changes within data center environments

>> Microsoft Windows Crash Reports Reveal New APT, POS Attacks
Researchers discover zero-day attacks after studying the contents of various "Dr. Watson" error reports

>> U.S. Running Out Of Allies In On Cyber Battlefield
International cyber policy and enforcement, and ownership over the Internet are thorny topics that will be tackled at the 2014 RSA Conference next week

>> Abusing Cloud Services for Cybercrime
At the upcoming RSA conference, researchers will discuss how a lack of anti-automation protections allow attackers to take advantage of free cloud services

>> RSA Conference Controversy Swirls, Spurs Debate Over Boycotts
Talk of boycotts has circled the RSA conference, but what will the outcome of it all be?

>> 9 Security Experts Boycott RSA Conference
Several leading security experts have pulled out of the RSA conference over unanswered questions concerning the NSA's $10 million payment to RSA

>> Using Attackers' Tactics To Battle Banking Trojans
At the upcoming RSA conference, Trustwave researchers will discuss using obfuscation to break the functionality of banking Trojans, such as ZeuS

RSA LIBRARY
RSA Conference 2013 Coverage
RSA Conference 2012 Coverage

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-3828
Published: 2014-10-22
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.