Interop New York 2013: Complete Coverage
Articles leading up to, live coverage from, and post-event analysis of Interop New York 2013
>> Embrace Your Inner Risk Adviser
Bridging the gap between security and IT and the business side requires teamwork on building a risk profile
>> At Interop, Plethora Of New Services Leaves Questions About Risk
GRC tools may offer security, risk answers as enterprises rely more heavily on service providers
>> 5 Lessons From Real-World Attacks
Tales from the trenches show that even small organizations are in the bull's eye
>> Cisco CEO: Internet Of Things Will Reshape IT
Internet-connected devices will drive a new IT infrastructure that must support an "application economy," predicts Cisco CEO John Chambers, speaking at Interop
>> CISO Shares Strategies For Surviving The Inevitability Of Attacks
Loop in application, network teams to help spot threats and attacks before they do harm
>> Reaping The Security Rewards Of SDN
Software-defined network will be a major theme for Interop -- here's why some experts believe security pros should be paying attention
>> Rise Of The 'Hit-And-Run' APT
A new model of cyberespionage is emerging that relies on cybermercenaries hired to break in, steal information, and then leave -- with specific targeted information
>> Protecting The Network From Bring-Your-Own Vulnerabilities
Companies that allow employees to use their own devices for work inherit their employees' vulnerabilities. How should companies secure networks in the age of BYOD?
>> 5 Steps To Stop A Snowden Scenario
The NSA leaks by a systems administrator have forced enterprises to rethink their risks of an insider leak and their privileged users' access
>> Penetration Testing For Beginners
Interop workshop instructor discusses what it takes for networking pros to start wrapping their arms around security testing basics
>> Q&A: Security In The Spotlight At Interop
Chair of Interop's Risk Management and Security Track John Pironti talks risk management and what to expect at the upcoming conference
>> Phishers Expand Brands, Shift Gears
More brands than ever getting phished as cybercriminals branch out and rely less on mass phishing attacks
>> Three Steps To Securing Businesses In A Post-Signature World
From fully-undetectable malware to low-volume targeted trojans, digital threats frequently do not have a signature, but companies can still prepare
>> 12 Must-Attend Interop Events
Interop New York is just around the corner. The show is packed with informative sessions and workshops. Here are a dozen to put on your schedule
>> Interop New York Sponsors & Exhibitors Launch New Products & Services
About the Author
You May Also Like
Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024