The ShmooCon security conference was excellent, as always. Lots of quality content. Check out the full coverage elsewhere on this site.Now it’s time to plan for RSA Conference 2011 in San Francisco. I’ll be there two weeks from right now, providing my travel plans aren’t snarled by another winter storm. Given how this winter has been going, a snowstorm on travel day would be typical.The talks at these events are always valuable, and it’s the talks that I usually write about. But the most important thing to do is network. Call it what you want: socializing, partying. In this business you need all the friends you can get. More friends in the same line of work as you means more of a support network when you’re sitting in your office wondering what the heck to do about the massive data breach you’ve just discovered. B-Sides San Francisco is that week, too. I see many good talks on that agenda, so if you’re walking around the Moscone Center and you get bored, you’ll want to check that out. More on that event later.Until then, be well. –Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe