Interop New York 2013: Complete CoverageInterop New York 2013: Complete Coverage
Articles leading up to, live coverage from, and post-event analysis of Interop New York 2013
August 29, 2013

>> Embrace Your Inner Risk Adviser
Bridging the gap between security and IT and the business side requires teamwork on building a risk profile
>> At Interop, Plethora Of New Services Leaves Questions About Risk
GRC tools may offer security, risk answers as enterprises rely more heavily on service providers
>> 5 Lessons From Real-World Attacks
Tales from the trenches show that even small organizations are in the bull's eye
>> Cisco CEO: Internet Of Things Will Reshape IT
Internet-connected devices will drive a new IT infrastructure that must support an "application economy," predicts Cisco CEO John Chambers, speaking at Interop
>> CISO Shares Strategies For Surviving The Inevitability Of Attacks
Loop in application, network teams to help spot threats and attacks before they do harm
>> Reaping The Security Rewards Of SDN
Software-defined network will be a major theme for Interop -- here's why some experts believe security pros should be paying attention
>> Rise Of The 'Hit-And-Run' APT
A new model of cyberespionage is emerging that relies on cybermercenaries hired to break in, steal information, and then leave -- with specific targeted information
>> Protecting The Network From Bring-Your-Own Vulnerabilities
Companies that allow employees to use their own devices for work inherit their employees' vulnerabilities. How should companies secure networks in the age of BYOD?
>> 5 Steps To Stop A Snowden Scenario
The NSA leaks by a systems administrator have forced enterprises to rethink their risks of an insider leak and their privileged users' access
>> Penetration Testing For Beginners
Interop workshop instructor discusses what it takes for networking pros to start wrapping their arms around security testing basics
>> Q&A: Security In The Spotlight At Interop
Chair of Interop's Risk Management and Security Track John Pironti talks risk management and what to expect at the upcoming conference
>> Phishers Expand Brands, Shift Gears
More brands than ever getting phished as cybercriminals branch out and rely less on mass phishing attacks
>> Three Steps To Securing Businesses In A Post-Signature World
From fully-undetectable malware to low-volume targeted trojans, digital threats frequently do not have a signature, but companies can still prepare
>> 12 Must-Attend Interop Events
Interop New York is just around the corner. The show is packed with informative sessions and workshops. Here are a dozen to put on your schedule
>> Interop New York Sponsors & Exhibitors Launch New Products & Services
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023