X

At RSA 2010, the secure and the insecure (photos)

The cybersecurity conference in San Francisco brings together hackers and security professionals to decode the latest threats to the digital world.

CNET Reviews staff

See full bio
rsa2010-2.jpg
1 of 9 James Martin/CNET

Credit cards for sale

Cybersecurity professional from around the world met in San Francisco this week at the RSA 2010 conference to explore some of the nefarious behind-the-scenes activity happening everyday in computers around the world.

An educational opportunity to learn from hackers and security professionals alike, at RSA, it's clear just how vulnerable the world's digital infrastructure is.

howard-schmidt-rsa-5.jpg
2 of 9 James Martin/CNET

Howard Schmidt

U.S. Cybersecurity Coordinator Howard Schmidt announced the publication of the five-page summary of NSPD54, the secret cybersecurity directive signed by President Bush two years ago.
rsa2010-3.jpg
3 of 9 James Martin/CNET

Symantec

Inside the Moscone Center in San Francisco, Symantec featured an exhibit which visualized the world of criminal hacker organizations, and displayed the tools of the trade of the black-market information sharing industry.
rsa2010-4.jpg
4 of 9 James Martin/CNET

The Hacking Industry

No longer do the threats arise from a few rogue hackers. Nowadays, the business of computer crime has grown into a powerful industry, with the trading of information becoming an organized, and profitable, career.
rsa2010-5.jpg
5 of 9 James Martin/CNET

Hacker Marc Maiffret

Hacker Marc Maiffret, chief security architect at FireEye, helps drive technology innovation in the cause of fighting malware.
rsa2010-6.jpg
6 of 9 James Martin/CNET

Janet Napolitano

Homeland Security Secretary Janet Napolitano speaks at the RSA conference on Wednesday, talking a bit about the Einstein 3 technology, which is used in efforts to thwart in-progress cyberattacks by sharing information with the National Security Agency.
rsa2010-7.jpg
7 of 9 James Martin/CNET

Robert Mueller

Robert Mueller, speaking Thursday, said that criminal organizations, as well as individuals, militant groups, and foreign states, pose a growing threat to U.S. security as they target government and private computer networks.
rsa2010.jpg
8 of 9 James Martin/CNET

Stuart McClure

Stuart McClure, general manager and senior vice president of the Risk and Compliance business unit at McAfee, on Wednesday demonstrated how someone might use Twitter as a command and control center for compromised PCs working to hack a bank account.
scott-charney-rsa-4.jpg
9 of 9 James Martin/CNET

Scott Charney

Scott Charney, Microsoft's corporate vice president of Trustworthy Computing, spoke Tuesday, the same day Microsoft released its new identity management software. Charney also said that Microsoft is working on a prototype national ID card system in Germany that is designed to give consumers control over the amount of personal data they share with specific organizations.

More Galleries

2022's Best TV Shows You Can't Miss on Netflix, HBO, Disney Plus and More
John Cena attends Warner Bros. premiere of The Suicide Squad, in costume as Peacemaker.

2022's Best TV Shows You Can't Miss on Netflix, HBO, Disney Plus and More

95 Photos
Movies Coming in 2022 From Marvel, Netflix, DC and More
thor4

Movies Coming in 2022 From Marvel, Netflix, DC and More

85 Photos
The Best Games on Nintendo Switch in 2022
zelda-cnet-2.jpg

The Best Games on Nintendo Switch in 2022

36 Photos
The 51 Best VR Games
astro-bot-rescue-mission-screen-02-ps4-us-18may18

The 51 Best VR Games

53 Photos
2023 Toyota Crown Is One Funky Hybrid Sedan
2023 Toyota Crown

2023 Toyota Crown Is One Funky Hybrid Sedan

48 Photos
24 things you should never, ever google
snape

24 things you should never, ever google

25 Photos
DIY scratched screen repair: Magic and myths
img9412.jpg

DIY scratched screen repair: Magic and myths

10 Photos