RSA Conference Daily
-- Brought To You By Dark Reading & InformationWeek

Follow our coverage of RSA on:
Facebook: http://www.facebook.com/pages/Dark-Reading/117573104930124
Twitter: https://twitter.com/DarkReading
LinkedIn: http://www.linkedin.com/groups/Dark-Reading-3193466

Wednesday, April 18, 2018

HIGHLIGHTS:
- Trump Administration Cyber Czar Rob Joyce to Return to the NSA
- NIST Seeking Comments on New AppSec Practices Standards
- 8 Ways Hackers Monetize Stolen Data
- Majority of Men Think Women Have Equal Opportunity to Advance in Cybersecurity Career
- RSA Today: Five Most Dangerous New Attack Techniques, and What's Coming Next

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TOP STORIES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Trump Administration Cyber Czar Rob Joyce to Return to the NSA

First year of Trump White House's cybersecurity policy mostly followed in the footsteps of the Obama administration.
https://www.darkreading.com/perimeter/trump-administration-cyber-czar-rob-joyce-to-return-to-the-nsa/d/d-id/1331571

- 8 Ways Hackers Monetize Stolen Data

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
https://www.darkreading.com/attacks-breaches/8-ways-hackers-monetize-stolen-data-----------/d/d-id/1331560


- NIST Seeking Comments on New AppSec Practices Standards

Working in conjunction with SAFECode, NIST is opening the floor to suggestions at RSA about secure software development life cycle guidelines.
https://www.darkreading.com/application-security/nist-seeking-comments-on-new-appsec-practices-standards/d/d-id/1331570


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
LATEST NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Majority of Men Think Women Have Equal Opportunity to Advance in Cybersecurity Career

Not so fast, say women.
https://www.darkreading.com/careers-and-people/majority-of-men-think-women-have-equal-opportunity-to-advance-in-cybersecurity-career/d/d-id/1331566

- New Malware Adds RAT to a Persistent Loader

A newly discovered variant of a long-known malware loader adds the ability to control the victim from afar.
https://www.darkreading.com/attacks-breaches/new-malware-adds-rat-to-a-persistent-loader/d/d-id/1331559

- Why We Need Privacy Solutions That Scale Across Borders

New privacy solutions are becoming scalable, smarter, and easier to address compliance across industries and geographies.
https://www.darkreading.com/endpoint/privacy/why-we-need-privacy-solutions-that-scale-across-borders-/a/d-id/1331505

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TODAY'S RSA EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- The Five Most Dangerous New Attack Techniques, and What's Coming Next 11:15 AM - 12:00 PM | Moscone West Level 3

This fast-paced briefing will provide answers from the three people best positioned to know the answers: the head of the Internet Storm Center, a top hacker exploits expert/teacher in the US and a top expert on cyberattacks in the United Kingdom.

https://www.rsaconference.com/events/us18/agenda/sessions/11413-The-Five-Most-Dangerous-New-Attack-Techniques,-and-What's-Coming-Next

- The Rise of Confidential Computing

This free online seminar by Mark Russinovich, chief technology officer, Microsoft Azure, will describe architectures, runtimes, compilers and tooling for the creation of confidential computing services using TEEs.

https://www.rsaconference.com/events/us18/agenda/sessions/11538-The-Rise-of-Confidential-Computing

- RSAC Sandbox

A cool atmosphere with charging stations where you can learn and recharge your physical and mental batteries.
8:00 AM – 5:00 PM | Marriott Marquis, Yerba Buena 8

https://www.rsaconference.com/events/us18/agenda/the-sandbox


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
VENDOR ANNOUNCEMENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- SSH Communications Security, AppViewX Partner on Next-Gen Key and Certificate Management Solution

Leveraging AppViewX's CERT+ product, the strategic technology partnership brings customers a comprehensive key and certificate management solution for on-premises, cloud and network devices.
https://www.darkreading.com/cloud/ssh-communications-security-appviewx-partner-on-next-gen-key-and-certificate-management-solution/d/d-id/1331540

- CrowdStrike Announces Launch of Endpoint Protection Complete

CrowdStrike brings to market an instant, turnkey endpoint protection solution.
https://www.darkreading.com/cloud/crowdstrike-announces-launch-of-endpoint-protection-complete/d/d-id/1331544

- Tripwire Debuts Early Access Program for Container Analyzer Service

Security solution expands vulnerability visibility across DevOps life cycle
https://www.darkreading.com/application-security/tripwire-debuts-early-access-program-for-container-analyzer-service/d/d-id/1331548

- FireEye and Oracle Create a Strategic Partnership to Enable Security Through the Cloud

Collaboration introduces FireEye’s first Oracle cloud solution, FireEye Email Security on Oracle Cloud Infrastructure (OCI).
https://www.darkreading.com/fireeye-and-oracle-create-a-strategic-partnership-to-enable-security-through-the-cloud/d/d-id/1331549

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ADDITIONAL RESOURCES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Interop ITX: The Independent Conference For Tech Leaders, April 30 - May 4, Las Vegas

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts.

http://schedule.interop.com/track/security

- Dark Reading Tech Digest
Explore the steps enterprises can take to manage the cybersecurity skills shortage, and the risk these shortages pose in protecting against attacks

https://www.darkreading.com/drdigital/20180212td?

- [Strategic Security Report] Navigating the Threat Intelligence Maze

Most enterprises are using threat intel services but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.

http://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/[strategic-security-report]-navigating-the-threat-intelligence-maze/393933?

- Webinar May 9, 1:00 PM EDT: Outsourcing IT Security

A top expert discusses security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

https://webinar.darkreading.com/3587?keycode=sbx&cid=smartbox_techweb_webcast_8.500000824

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TO UNSUBSCRIBE:
To opt-out of any future marketing promotions from Dark Reading, please click here
Link

PRIVACY NOTICE
UBM Tech takes your privacy seriously.
To learn more, please read our Privacy Policy http://legal.us.ubm.com/privacy-policy/

FOR FURTHER COMMUNICATION, PLEASE CONTACT:
Customer Service
UBM Tech
2 Penn Plaza, 15th Floor
New York, NY 10121