A couple of weeks ago I attended the RSA conference in San Francisco. It’s a huge conference on IT security and I covered the event blogging and shooting video for my new client, Tripwire. They’re a log management company that also offers file integrity services.
What makes Tripwire’s product so unique as compared to other log management companies is that they sync log events with changes made on your network. Having that synced clarity to changes is extremely valuable as log files by themselves can spit out a mountain of erroneous information. You’ll learn more watching the videos, especially with the staff from Tripwire.
Please peruse the articles and videos. In total, I produced 35 articles of which 27 include videos.
Here’s a summary of all my coverage of the event:
- Can you rely on hard drive timecodes and the future of the smart grid?
- What are the new and old (yet still relevant) issues CISOs have to deal with?
- What responsibility do security bloggers have to the industry? (on Socialmedia.biz)
- If you want to succeed at security, you need to look at the winners
- Why do organizations respond so poorly to audits?
- Video Demo of the Enigma Machine (on Technologizer)
- Chris Hoff on the state of data in a virtualized environment
- Where is your software most vulnerable?
- Correlating static and dynamic analysis results for more secure software
- Highlights of the RSA Conference on The Rob Black Show
- We’re vulnerable to code that wasn’t financed by blue chip companies
- Proving the Worth of Security Metrics with Real-World Data
- If you don’t look at your log data, how are you going to catch data breaches?
- End of day show report from Alex Howard of SearchCompliance.com
- How do you secure 14,000 virtual machines on 512 servers?
- If you’re going for PCI compliance, just shut up and log
- Start thinking about security beyond just compliance
- Improve security by doing your part in the ecosystem
- PCI 2.0? What’s Next for the PCI Security Standards and Council?
- Pre-debate on ‘Proving the Worth of Security Metrics with Real-World Data’
- Stop obsessing over compliance and start obsessing over audits
- Benefits of working with government to catch cybercriminals
- A 360-Degree View into Data Breaches: Are We Our Own Worst Enemy?
- Security industry analysts’ roundtable
- How long are you going to wait to find out about a security breach?
- Use file integrity monitoring to fix human mistakes
- Cryptography panel is confusing. I guess that’s appropriate.
- Suspicious patterns alone aren’t enough to tell you you’ve got a problem
- Why you want to look at your change log in conjunction with your event log
- Cool card trick and money trick
- Security isn’t your company’s issue. It’s a shared responsibility
- Security in the cloud is everyone’s responsibility
- Getting more insight into your network activity (or non activity) and the changes that result
- Let’s stop trying to protect everything
- How to protect yourself from social networking malware (on Socialmedia.biz)