I also had a chance to speak with some of the industry’s brightest stars about information security; what’s happening right now, and what we should be concerned about. These will be broadcast on Tech Talk over the next few weeks.
For those that don’t know, RSA is the largest information security conference worldwide.
The letters RSA stand for the first letter of the surnames of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who, in 1977, first described the RSA algorithm at MIT. In cryptography, RSA is an algorithm for public-key cryptography.
I wanted to say a huge thanks to everyone that gave me some of their time.
If you’re interested in hearing what they have to say, consider subscribing to the Tech Talk Radio newsletter, which will give you a heads up just before the interviews go to air.
Ed Adams, President and CEO Security Innovation, talks about the Security Smackdown at RSA; and why it’s tricky for developers to keep up with the ever changing vulnerabilities facing information security.
John Carmichael walks us through DOS/DDOS attacks, SQL injection attacks, and Cross Site Scripting (XSS) attacks. If you don’t know what they are, John explains in English, then tells you how to protect your self.
We also have the full Security Smackdown Grand Finale, with the industry’s top minds pacing off and answering questions on the hottest topics. The Grand Finale panel includes Mary Ann Davidson, CSO, Oracle; Charles Kolodgy, senior security analyst for IDC, and John Stewart, CSO, CISCO.
The bad guys are getting older and more malicious while hackers are starting younger
Patrik Runald, security response manager for F-Secure, talks about the vulnerabilities facing consumers today. He gives us some great examples of what the bad guys have been doing, including explanations of DDOS and zombie networks, malware on Macs, and how QuickTime spreads malware.
We also get to hear about last January’s exploit that freezes up Apple’s iPhone; once installed the app displays the word “shoes” and when removed, it removes all files from the directory. It was created by an 11 year old in Poland.
How to use an iPod to hack into a computer
Larry Detar, vice president of EC Council Global Services, gives us a demonstration on how to hack into a computer using an iPod; simple really it turns out. The EC Council provides training in ethical hacking and so you can defend your own network; the course is for everyone, from the receptionist to the C-Suite.
New Generation Hackers and their social media tactics
Christopher Boyd, Director of Malware Research for FaceTime, talks about how social media is being used by the new generation of malware creators, and gives examples of breaches to MySpace, FaceBook, and Google’s Orkut -worth a listen.
Subscribe to Chris’ blog, Vital Security to stay up to date.
Hardcore data security
BenHur Castro, senior director for Seagate’s Consumer Solutions Division, tells us why the Maxtor BlackArmor is better than the rest. Bottom line: It’s an encrypted portable hard drive that uses government grade AES encryption at the hardware level. If you’ve been worried about losing your data, this is the product you need; $149 for 160GB.
Monitor up to three PCs in your house or small business
Amy Barzdukas, senior director Windows Live OneCare, talks about OneCare, an inexpensive solution ($49) that steps up the security already offered in Microsoft’s operating systems. The product offers more than just security, it allows automatic printer sharing, file backups, virus scanning, and monitoring of activity on all PCs hooked up to the OneCare product (up to three PCs per subscription) - pretty neat if you’ve got little people.