{"id":3678,"date":"2017-02-16T14:10:30","date_gmt":"2017-02-16T14:10:30","guid":{"rendered":"https:\/\/209.235.70.100\/?p=3678"},"modified":"2019-12-27T14:10:58","modified_gmt":"2019-12-27T14:10:58","slug":"3-recommended-readings-on-rsa-the-state-of-security","status":"publish","type":"post","link":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/","title":{"rendered":"3 Recommended Readings on RSA & the State of Security"},"content":{"rendered":"\n

The RSA Security Conference<\/a>, taking place through Friday, Feb. 17th<\/sup>, officially kicked off this week in San Francisco, CA. Top technology and security leaders have joined together to learn about new approaches to info security, discover the latest technology and engage in hands-on sessions, keynotes and informal gatherings to fuel the security decisions of tomorrow. <\/p>\n\n\n\n

Like many industry events, the underlying goal of the RSA Conference is to foster collaboration within the industry. This is particularly critical in the security industry as cybercrime is becoming more organized than ever before.<\/p>\n\n\n\n

The best way to combat the highly sophisticated criminals of today is to make the \u201cgood guys\u201d that much stronger by working together. Thankfully, organizations are also moving away from working in siloes and are now developing security technologies that are working together to aggregate information, so users can monitor and address all vulnerabilities.<\/p>\n\n\n\n

The RSA Conference serves as an indicator of where the industry is today and where it\u2019s going as threats continue to evolve. Knowledge is power and to stay \u201cin-the-know,\u201d I\u2019ve compiled several articles on the conference that also exemplify the current state of cyber security:<\/p>\n\n\n\n

  1. RSA Conference Adapts to Address Emerging Threats, Technologies<\/a>: <\/strong>David Needle published an article in eWEEK that offers insight on how the conference has evolved over the years. As the security conference enters its 26th year, its scope has greatly expanded to address a new generation of threats, such as ransomware, according to the piece. The article also highlights how new sessions have been developed to address emerging topics, including diversity and cyber-safety for parents.<\/li>
  2. RSA Conference preview: The agenda can’t keep up<\/a>: <\/strong>InfoWorld\u2019s Fahmida Rashid takes note of the unprecedented speed at which new security vulnerabilities develop. According to the article, the latest, scariest, most sophisticated threats are too fresh for even the RSA Conference to cover, as planning for the conference starts months before the event. The piece suggests that the real value to be derived from the event is on how to be a better defender and the \u201cbest and most valuable discussions [will take place] in and around the lounge seating areas, around the water coolers, and in closed-door conversations.\u201d<\/li>
  3. It\u2019s \u2018Code Red\u2019 as Cyber-Security Pros Gather<\/a>:<\/strong> According to this Elizabeth Weise piece in USA Today, cybersecurity threats are now a household worry and the RSA Conference is becoming increasingly important in driving the industry forward. As quoted in the article Avivah Litan, a security analyst with Gartner, said \u201cthe threat level is now Code Red.\u201d The conference is taking on critical issues, such as nation-state hacking, botnet wipeouts and ransomware, among various other topics impacting enterprises and consumers alike.   <\/li><\/ol>\n\n\n\n

    When speaking with clients, cloud security<\/a> remains a critical concern and area of focus as we enter 2017. The RSA Conference is an indication that customer concerns are being heard loud and clear.<\/p>\n\n\n\n

    I\u2019m eager to learn the key takeaways from the RSA Conference, particularly as they relate to cloud computing. Stay tuned for a deep dive blog following the RSA Conference that takes a look at some of the most pertinent challenges and opportunities in cloud security. And if you weren\u2019t able to attend the RSA Conference, you can always watch a livestream of the conference<\/a> to hear keynotes with expert insight on the latest trends in security. Additionally,SiliconANGLE and the mobile video studio, theCUBE, will be covering this year\u2019s RSA Conference independently with exclusive interviews onsite<\/a>.<\/p>\n\n\n\n

    Whether your IT is hosted on-premises or in the cloud, careful consideration needs to be paid to designing and implementing an enterprise security plan.<\/em> <\/em>To learn more about developing a cloud security plan, download this white paper:<\/em> <\/em>7 Steps to Developing a Cloud Security Plan<\/em><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":114,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"\n3 Recommended Readings on RSA & the State of Security - Navisite<\/title>\n<meta name=\"description\" content=\"The RSA Security Conference, taking place through Friday, Feb. 17th, officially kicked off this week in San Francisco, CA. Top technology and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Recommended Readings on RSA & the State of Security\" \/>\n<meta property=\"og:description\" content=\"The RSA Security Conference, taking place through Friday, Feb. 17th, officially kicked off this week in San Francisco, CA. Top technology and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Navisite\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-16T14:10:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-27T14:10:58+00:00\" \/>\n<meta name=\"author\" content=\"Megan Ferringer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@navisite\" \/>\n<meta name=\"twitter:site\" content=\"@navisite\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megan Ferringer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/\"},\"author\":{\"name\":\"Megan Ferringer\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f\"},\"headline\":\"3 Recommended Readings on RSA & the State of Security\",\"datePublished\":\"2017-02-16T14:10:30+00:00\",\"dateModified\":\"2019-12-27T14:10:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/\"},\"wordCount\":645,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.navisite.com\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/\",\"url\":\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/\",\"name\":\"3 Recommended Readings on RSA & the State of Security - Navisite\",\"isPartOf\":{\"@id\":\"https:\/\/www.navisite.com\/#website\"},\"datePublished\":\"2017-02-16T14:10:30+00:00\",\"dateModified\":\"2019-12-27T14:10:58+00:00\",\"description\":\"The RSA Security Conference, taking place through Friday, Feb. 17th, officially kicked off this week in San Francisco, CA. Top technology and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.navisite.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Recommended Readings on RSA & the State of Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.navisite.com\/#website\",\"url\":\"https:\/\/www.navisite.com\/\",\"name\":\"Navisite\",\"description\":\"Elevate Your Cloud Journey\",\"publisher\":{\"@id\":\"https:\/\/www.navisite.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.navisite.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.navisite.com\/#organization\",\"name\":\"Navisite\",\"url\":\"https:\/\/www.navisite.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg\",\"contentUrl\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Navisite\"},\"image\":{\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/navisite\",\"https:\/\/www.instagram.com\/navisite\/\",\"https:\/\/www.linkedin.com\/company\/navisite\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f\",\"name\":\"Megan Ferringer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg\",\"contentUrl\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg\",\"caption\":\"Megan Ferringer\"},\"description\":\"Megan is the Content Marketing Manager at Navisite with more than 10 years of experience helping brands discover and tell their stories. From working at a global non-profit organization to boutique marketing agencies in Chicago, she champions the power of storytelling across all industries.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"3 Recommended Readings on RSA & the State of Security - Navisite","description":"The RSA Security Conference, taking place through Friday, Feb. 17th, officially kicked off this week in San Francisco, CA. Top technology and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/","og_locale":"en_US","og_type":"article","og_title":"3 Recommended Readings on RSA & the State of Security","og_description":"The RSA Security Conference, taking place through Friday, Feb. 17th, officially kicked off this week in San Francisco, CA. Top technology and","og_url":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/","og_site_name":"Navisite","article_published_time":"2017-02-16T14:10:30+00:00","article_modified_time":"2019-12-27T14:10:58+00:00","author":"Megan Ferringer","twitter_card":"summary_large_image","twitter_creator":"@navisite","twitter_site":"@navisite","twitter_misc":{"Written by":"Megan Ferringer","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/#article","isPartOf":{"@id":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/"},"author":{"name":"Megan Ferringer","@id":"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f"},"headline":"3 Recommended Readings on RSA & the State of Security","datePublished":"2017-02-16T14:10:30+00:00","dateModified":"2019-12-27T14:10:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/"},"wordCount":645,"commentCount":0,"publisher":{"@id":"https:\/\/www.navisite.com\/#organization"},"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/","url":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/","name":"3 Recommended Readings on RSA & the State of Security - Navisite","isPartOf":{"@id":"https:\/\/www.navisite.com\/#website"},"datePublished":"2017-02-16T14:10:30+00:00","dateModified":"2019-12-27T14:10:58+00:00","description":"The RSA Security Conference, taking place through Friday, Feb. 17th, officially kicked off this week in San Francisco, CA. Top technology and","breadcrumb":{"@id":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.navisite.com\/blog\/3-recommended-readings-on-rsa-the-state-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.navisite.com\/"},{"@type":"ListItem","position":2,"name":"3 Recommended Readings on RSA & the State of Security"}]},{"@type":"WebSite","@id":"https:\/\/www.navisite.com\/#website","url":"https:\/\/www.navisite.com\/","name":"Navisite","description":"Elevate Your Cloud Journey","publisher":{"@id":"https:\/\/www.navisite.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.navisite.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.navisite.com\/#organization","name":"Navisite","url":"https:\/\/www.navisite.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg","contentUrl":"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg","width":1,"height":1,"caption":"Navisite"},"image":{"@id":"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/navisite","https:\/\/www.instagram.com\/navisite\/","https:\/\/www.linkedin.com\/company\/navisite"]},{"@type":"Person","@id":"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f","name":"Megan Ferringer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.navisite.com\/#\/schema\/person\/image\/","url":"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg","contentUrl":"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg","caption":"Megan Ferringer"},"description":"Megan is the Content Marketing Manager at Navisite with more than 10 years of experience helping brands discover and tell their stories. From working at a global non-profit organization to boutique marketing agencies in Chicago, she champions the power of storytelling across all industries."}]}},"publishpress_future_action":{"enabled":false,"date":"1970-01-01 00:00:00","action":"","terms":[],"taxonomy":"","browser_timezone_offset":0},"_links":{"self":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/posts\/3678"}],"collection":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/users\/114"}],"replies":[{"embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/comments?post=3678"}],"version-history":[{"count":0,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/posts\/3678\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/media?parent=3678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/categories?post=3678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/tags?post=3678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}