Tag: conferences

How Machine Learning Supplements Security Workforce | Cylance Blog

How Machine Learning Supplements Security Workforce | Cylance Blog

In-brief: Filmed at The RSA Security Conference in San Francisco, Security Ledger Editor in Chief Paul Roberts talks about the growing interest in machine learning technology in the information security field and how it is being applied.

UnifyID, the winner of a start-up competition at The RSA Conference, is offering a new type of "implicit" identity service.

RSA’s Hottest Startup Signals Online Identity Shakeup

In-brief: The RSA Conference’s most celebrated start-up, UnifyID, signals a fast-approaching revolution in how we do identity online.

Security Ledger Editor In Chief Paul Roberts speaks with Chenxi Wang of Twistlock at The RSA Conference. (Image courtesy of RSA Conference)

Interview: Chenxi Wang on Information Security’s Mr. Robot Problem and Enforcing IoT Standards

In-brief: In an interview with Security Ledger Editor in Chief Paul Roberts, Chenxi Wang of the firm Twist Lock talks about information security’s “Mr. Robot” problem and the need for standards for the Internet of Things. 

Check out Security Ledger at the RSA Conference in San Francisco Next Week! (Image courtesy of RSA.)

Late to Bed, Early to Rise: Security Ledger at The RSA Conference

In-brief: The Security Ledger’s Paul Roberts will be at the RSA Conference in San Francisco next week. You can see him at one of three panel discussions, or interviewing security luminaries on RSA Conference TV. 

Will hack for beer? Cisco's Talos security group rigged up a Kegerator with a WiFi hotspot and other controls, allowing an enterprising hacker who could break into the device to poor him or herself a beer. (Image courtesy of Marc Blackmer.)

At Industrial Control Security Con: Will hack IoT for Beer

In-brief: Cisco’s Marc Blackmer reports from the S4 Conference in Miami – one of the top gatherings of industrial control system security experts. Among the attractions this year: Justine Bone of the firm Medsec, the psychology of malicious insiders and a hackable “kegerator.”