X

At RSA 2010, the secure and the insecure (photos)

The cybersecurity conference in San Francisco brings together hackers and security professionals to decode the latest threats to the digital world.

CNET Reviews staff
rsa2010-2.jpg
1 of 9 James Martin/CNET

Credit cards for sale

Cybersecurity professional from around the world met in San Francisco this week at the RSA 2010 conference to explore some of the nefarious behind-the-scenes activity happening everyday in computers around the world.

An educational opportunity to learn from hackers and security professionals alike, at RSA, it's clear just how vulnerable the world's digital infrastructure is.

howard-schmidt-rsa-5.jpg
2 of 9 James Martin/CNET

Howard Schmidt

U.S. Cybersecurity Coordinator Howard Schmidt announced the publication of the five-page summary of NSPD54, the secret cybersecurity directive signed by President Bush two years ago.
rsa2010-3.jpg
3 of 9 James Martin/CNET

Symantec

Inside the Moscone Center in San Francisco, Symantec featured an exhibit which visualized the world of criminal hacker organizations, and displayed the tools of the trade of the black-market information sharing industry.
rsa2010-4.jpg
4 of 9 James Martin/CNET

The Hacking Industry

No longer do the threats arise from a few rogue hackers. Nowadays, the business of computer crime has grown into a powerful industry, with the trading of information becoming an organized, and profitable, career.
rsa2010-5.jpg
5 of 9 James Martin/CNET

Hacker Marc Maiffret

Hacker Marc Maiffret, chief security architect at FireEye, helps drive technology innovation in the cause of fighting malware.
rsa2010-6.jpg
6 of 9 James Martin/CNET

Janet Napolitano

Homeland Security Secretary Janet Napolitano speaks at the RSA conference on Wednesday, talking a bit about the Einstein 3 technology, which is used in efforts to thwart in-progress cyberattacks by sharing information with the National Security Agency.
rsa2010-7.jpg
7 of 9 James Martin/CNET

Robert Mueller

Robert Mueller, speaking Thursday, said that criminal organizations, as well as individuals, militant groups, and foreign states, pose a growing threat to U.S. security as they target government and private computer networks.
rsa2010.jpg
8 of 9 James Martin/CNET

Stuart McClure

Stuart McClure, general manager and senior vice president of the Risk and Compliance business unit at McAfee, on Wednesday demonstrated how someone might use Twitter as a command and control center for compromised PCs working to hack a bank account.
scott-charney-rsa-4.jpg
9 of 9 James Martin/CNET

Scott Charney

Scott Charney, Microsoft's corporate vice president of Trustworthy Computing, spoke Tuesday, the same day Microsoft released its new identity management software. Charney also said that Microsoft is working on a prototype national ID card system in Germany that is designed to give consumers control over the amount of personal data they share with specific organizations.

More Galleries

My Favorite Shots From the Galaxy S24 Ultra's Camera
A houseplant

My Favorite Shots From the Galaxy S24 Ultra's Camera

20 Photos
Honor's Magic V2 Foldable Is Lighter Than Samsung's Galaxy S24 Ultra
magic-v2-2024-foldable-1383

Honor's Magic V2 Foldable Is Lighter Than Samsung's Galaxy S24 Ultra

10 Photos
The Samsung Galaxy S24 and S24 Plus Looks Sweet in Aluminum
Samsung Galaxy S24

The Samsung Galaxy S24 and S24 Plus Looks Sweet in Aluminum

23 Photos
Samsung's Galaxy S24 Ultra Now Has a Titanium Design
The Galaxy S24 Ultra in multiple colors

Samsung's Galaxy S24 Ultra Now Has a Titanium Design

23 Photos
I Took 600+ Photos With the iPhone 15 Pro and Pro Max. Look at My Favorites
img-0368.jpg

I Took 600+ Photos With the iPhone 15 Pro and Pro Max. Look at My Favorites

34 Photos
17 Hidden iOS 17 Features and Settings on Your iPhone
Invitation for the Apple September iPhone 15 event

17 Hidden iOS 17 Features and Settings on Your iPhone

18 Photos
AI or Not AI: Can You Spot the Real Photos?
img-1599-2.jpg

AI or Not AI: Can You Spot the Real Photos?

17 Photos