Highlights and interviews from last week's big security show Last week’s 2016 RSA Conference may be in your rear-view mirror, but if you want a quick recap/catch-up session while waiting for your next meeting to begin, here are a bunch of video interviews that CSO and our sister site, Network World, did at the show: Malware/threats/hackingNetwork hacking methods and prevention tipsAt the 2016 RSA Conference, CSO’s Steve Ragan chats with Fengmin Gong, co-founder and Chief Strategy Officer of Cyphort, about the latest ways that cybercriminals are attacking networks. In addition, he presents some ways on how IT can prevent (or slow down) the attacks.Webroot on the rise of polymorphic malware threats At the 2016 RSA Conference, CSO chats with Grayson Milbourne of Webroot, about the latest malware trends it saw from its customer base, including the growing importance of polymorphic malware and the flaws in signature-based detection.Behind the scenes of Vidder’s $10K hacking contest At the RSA Conference in San Francisco, CSO’s Steve Ragan chats with Junaid Islam, president and CEO of Vidder, about their $10,000 hacking contest at the show, and how the company’s software-defined perimeter technology protects sensitive data. Is a cyber-liability insurance policy in your company’s future?At the 2016 RSA Conference, CSO’s Steve Ragan chats with Chris Wyospal, co-founder and CTO of Veracode, about the importance of liability insurance for companies that may be affected by data breaches. How Verizon’s new Data Breach Digest provides insights into security attacks At the 2016 RSA Conference, Network World’s Tim Greene chats with Bryan Sartin, a director at Verizon, about its new Data Breach Digest, and the insights it offers to enterprises looking to protect their systems. >Data encryption The tricky balance between back doors and encryption: Zscaler’s Jay Chaudhry At the 2016 RSA Conference, CSO’s Steve Ragan chats with Zscaler CEO Jay Chaudhry about the Apple/FBI case, and whether there’s a way to have encryption backdoors without letting everyone in. It’s 2016: Do you know where your data is?At the 2016 RSA Conference, CSO talked with John Grimm and Peter Galvin from Thales e-Security about their latest data encryption report. The big trends: More companies are moving sensitive data to the cloud, but a lot of organizations still don’t know where all of their data lives (whether on site, in the cloud or on mobile devices). Why data security is getting more complex: VormetricAt the RSA Conference in San Francisco, Sol Cates, CSO of Vormetric, talks with CSO about why securing data at companies is getting more difficult. The company released its 2016 Data Threat Report at the show. Social engineering / Business Email Compromise Consumer and enterprise social engineering tricks: What’s workingAt RSA Conference, we catch up with Markus Jakobsson, Founder and CTO of ZapFraud, about the latest trends in consumer and enterprise scams (phishing schemes), including the very successful “email from the CEO” trick. Raising awareness of business email threats: AppRiverAt the 2016 RSA Conference, CSO’s Steve Ragan chats with Fred Touchette from AppRiver about the latest phishing and email threats, and ways for companies and employees to become more aware about not falling for these threats (as well as ransomware). PhishLabs on the growing sophistication of business email scamsAt the 2016 RSA Conference, CSO’s Steve Ragan chats with Joseph Opacki from PhishLabs about how cyber-criminals are becoming increasingly smarter about targeting specific high-end business users to try and steal data or money. Behavioral biometrics Behavioral biometrics and the future of the passwordAt the 2016 RSA Conference in San Francisco, CSO chats with SecureAuth about their behavioral biometrics technology, which allows or prevents access depending on a person’s keystroke and mousing techniques. Could this method replace or improve on password authentication?re> BioCatch on the rise of behavioral biometricsAt the 2016 RSA Conference, CSO chats with Uri Rivner from BioCatch about how behavioral biometrics will improve authentication methods, not just at login but during an entire web- or tablet-based session. Product overviews / startups / profile Security startup spotlight: SafeBreachAt the RSA Innovation Sandbox, CSO checks in with SafeBreach, which offers companies the chance to run hacking simulations on their systems to help identify weak points. Security startup spotlight: Illusive NetworksAt the RSA Innovation Sandbox, CSO checks in with Illusive Networks, which plans on utilizing “Deceptions” across the network to trick hackers trying to break into a company’s system. Security spotlight: Kevin Walker, Juniper’s Security CTOAt the RSA Conference in San Francisco, Network World chats with Juniper Networks’ new Security CTO about his role and how he will work with customers on securing their networks. Collaborating on incident response: Rook SecurityAt the 2016 RSA Conference, CSO’s Steve Ragan chats with J.J. Thompson, CEO of Rook Security, about how security teams can collaborate better (including via mobile devices) during incident response events.US says cyberbattle against ISIS will black them outThe U.S. is aggressively targeting ISIS in cyberspace, attempting to halt the group’s ability to communicate electronically, Secretary of Defense Ash Carter said Thursday. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe