You Are Here: Home » Articles posted by Bill Keeler

The 2015 RSA Conference Clock Ticks Toward April 20

Are you a marketing or public relations professional responsible for making your executive team look good in front of reporters and industry analysts at the 2015 RSA Conference? Do you have your finger on the pulse of how reporters plan to spend their time at the conference? How many media briefings do you have scheduled for your executives? Whether you have answers to one, two or all three questions, there ...

Read more

IT Security Trade Shows: How to Maximize Conference PR in 2015

With the Black Hat Conference now a memory, the 2014 trade show season ends for many IT security companies. Surely, some will attend SecureWorld events or Black Hat Europe, but most go into "bunker mode" in Q4 and stow trade show booths for a few months.  MSLGROUP clients were busy at Black Hat 2014 with more than 75 interviews taking place with journalists and industry analysts. From a PR perspective, what ...

Read more

Cybersecurity Executive Order – Is This It?

Well, the White House issued the Cybersecurity Executive Order on Tuesday and many are wondering if that's it?Here are a few key takeaways from the EO. It will be interesting to see the unclassified documents showing specific cyber threats already attempted on critical infrastructure sites. One year from today a final Cybersecurity Framework will be published per the EO.  Did you think there would ...

Read more

Road to RSA eBook Available Now

The RSA Conference 2013 is just around the corner and there is nothing more important for most companies than connecting with new prospects and re-connecting with current partners and customers. It is a place to get reacquainted with old friends and colleagues but also meet new people in order to hear their take on identifying and mitigating myriad IT Security network and mobile device threats. Often times, ...

Read more

2013 IT Security Predictions from Cloudmark

Today’s Tangled Web posting comes from Neil Cook, CTO for Cloudmark. Cook shares his security trends for 2013.The prevalence of smartphones and continuing rollout of Long Term Evolution, a widely adopted standard for wireless communication of high-speed data for mobile phones and data terminals, will help create optimal conditions for spam-sending botnets. We’ve already witnessed examples of sel ...

Read more

Security Predictions for 2013 from Cenzic

The next in our series of 2013 predictions posts comes from Campbell, California. Read on to see what Cenzic Chief Marketing Officer Bala Venkat has to say about IT security trends in the New Year.As the year 2012 comes to a close, it is quite clear that mobile and Web based applications will continue to gain popularity in 2013. While it makes perfect business sense for organization ...

Read more

Trends for 2013: Astounding Growth of Mobile Malware

Today’s Tangled Web posting comes from Sebastian Bortnik, education & research manager for ESET Latin America. Bortnik shares his security trends for 2013. In 2012 the number of unique detections of malware for Android increased globally by a factor of 17X (yes, that is 1,700%), and we expect the increase in 2013 to be even greater. This is one of the main predictions in the white paper we ar ...

Read more

2013 IT Security Predictions from BlueCoat

Tuesday’s Tangled Web posting comes from Chris Larsen, BlueCoat’s Malware Research Team Leader. Read on to see what Larsen has to say about IT security trends in 2013.Chris Larsen, Malware Research Team Leader of BlueCoatMass Market Attacks Become a Beachhead for Targeted Attacks If your organization has valuable data, assume someone is going to come after it in 2013 through mass market attacks ...

Read more

Five Cybercrime Trends Likely to Continue into 2013

Up next in our security predictions series is from Salt Lake City, Utah. Read on to see what Solera Networks Director of Threat Research, Andrew Brandt has to say about IT security trends in 2013. 2012 has been a challenging year for incident responders and security analysts. Ne’er-do-wells of the Internet have been flooding our inboxes with malicious spam; scattering exploit kits around the ‘ne ...

Read more

Information Security in 2013

The next in our series of prediction posts comes from Addison, Texas. Read on to see what Credant Technologies CTO Chris Burchett has to say about IT security trends in 2013.Chris Burchett, CTO of Credant TechnologiesAs Sun Tzu puts it in the Art of War (required reading for the CIA I believe, and recommended reading throughout the DoD): “When the enemy is relaxed, make them toil.  When full, sta ...

Read more

2013 IT Security Predictions from Lancope

In our next installment of 2013 IT security predictions, Lancope Director of Security Research Tom Cross shares several challenges that IT and security professionals will have to face in the coming year. Tom Cross, director of security research, LancopeThe challenges, which are featured on Forbes.com this week, include:State-sponsored espionage and sabotage of computer networksMonster DDoS attacksThe l ...

Read more

2013 IT Security Predictions from LogRhythm

The next in our series of prediction posts comes from Boulder, Colorado. Read on to see what LogRhythm’s Director of Product Management, Seth Goldhammer has to say about IT security trends in 2013.Seth Goldhammer, director of product management, LogRhythmWe will see the first major malware on a mobile platform. There has already been malware that has made it into the Android Play Store and even Apple ...

Read more