Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

DerbyCon – “The Reunion” September 27th to September 30, 2012

Welcome to DerbyCon 2.0 – “The Reunion”. This is the place where security professionals from all over the world come to hang out. DerbyCon 2.0 will be held September 27-30th, 2012. DerbyCon 2011 pulled in over 1,100 people with an amazing speaker lineup and a family-like feel. We’ve listened to your feedback and plan on making this conference even better. Our goal is to keep it around the same size and maintain a close-knit conference where we all come together to learn and share ideas.

SC eSymposium: Privacy & security

Those engaging in cyberespionage to steal various classified and/or proprietary documents from U.S. agencies and other organizations are riding high. Foreign spies, including U.S. allies, are increasingly launching digital assaults against the nation to steal sensitive economic secrets, according to a recent report by the U.S. Office of National Counterintelligence Executive (UNSEX). The theft of this critical information shows that attackers – state-sponsored or not – are enlisting whatever weaknesses in systems they can to thieve corporate and government data, often going unnoticed for months. Experts share background on the types of attacks to watch out for and what to do to thwart them.

DerbyCon – “The Reunion” September 27th to September 30, 2012

Welcome to DerbyCon 2.0 – “The Reunion”. This is the place where security professionals from all over the world come to hang out. DerbyCon 2.0 will be held September 27-30th, 2012. DerbyCon 2011 pulled in over 1,100 people with an amazing speaker lineup and a family-like feel. We’ve listened to your feedback and plan on making this conference even better. Our goal is to keep it around the same size and maintain a close-knit conference where we all come together to learn and share ideas.

SC eSymposium: Privacy & security

Those engaging in cyberespionage to steal various classified and/or proprietary documents from U.S. agencies and other organizations are riding high. Foreign spies, including U.S. allies, are increasingly launching digital assaults against the nation to steal sensitive economic secrets, according to a recent report by the U.S. Office of National Counterintelligence Executive (UNSEX). The theft of this critical information shows that attackers – state-sponsored or not – are enlisting whatever weaknesses in systems they can to thieve corporate and government data, often going unnoticed for months. Experts share background on the types of attacks to watch out for and what to do to thwart them.