/>
X

Join or Sign In

Register for your free ZDNet membership or if you are already a member, sign in using your preferred method below.

Use your email Use Linkedin Use Facebook

Photos: RSA 2007

Cybersecurity professionals gathered in San Francisco for the RSA 2007 Conference

|
zd-defaultauthor-dan-farber.jpg
|
Topic: Security
53781.jpg
1 of 19 Dan Farber/ZDNet
Cybersecurity professionals gathered in San Francisco for the RSA 2007 Conference.
Adi Shamir, one of the inventors of the RSA algorithm, said that "security wins many battles but loses the security war. We are definitely going backwards in computer security."
53782.jpg
2 of 19 Dan Farber/ZDNet

Ron Rivest, one of the inventors of the RSA algorithm, said that the field of theoretical cryptography blossomed in a way that he didn't anticipate in the early days.

53783.jpg
3 of 19 Dan Farber/ZDNet

Martin Hellman, an inventor of public key cryptography along with with Whitfield Diffie and Ralph Merkle, believes that security bolted onto systems cannot be effective. He was also curious to see if the iPod can become a trustworthy agent.

53784.jpg
4 of 19 Dan Farber/ZDNet

Whitfield Diffie, one of the inventors of public key cryptography, is looking forward to seeing how Vista holds up in terms of security

53785.jpg
5 of 19 Dan Farber/ZDNet

The RSA Cryptographer's Panel: Moderator Bert Kaliski, Whitfield Diffie, Ron Rivest, Adi Shamir and Martin Hellman

53786.jpg
6 of 19 Dan Farber/ZDNet

Parade of cryptographic legends

53787.jpg
7 of 19 Dan Farber/ZDNet

Jacques Stern, professeur d'informatique, directeur du DI (Département d'Informatique de l'Ecole normale supérieure) and directeur du laboratoire d'informatique de l'ENS, was awarded the RSA Math prize.

53788.jpg
8 of 19 Dan Farber/ZDNet

Symantec CEO John Thompson proclaimed that "people are today's new perimeter," and that managing user identities is the most pressing challenge facing the industry today.

53789.jpg
9 of 19 Dan Farber/ZDNet
Symantec CEO John Thompson said that "building confidence in the connected world is everybody's job–no company is so dominant or so all knowing that it can provide a level of confidence."
53790.jpg
10 of 19 Dan Farber/ZDNet

Art Coviello, executive vice president, EMC and president, RSA, said, "We haven't implemented information security. We have been securing the perimeter, the moat and castle, but not the king, and information is the king. And like a king, information has a nasty habit of wanting to move around."

53792.jpg
11 of 19 Dan Farber/ZDNet

Joe Tucci, CEO of EMC, and Art Coviello, executive vice president, EMC and president, RSA, discuss their recent merger.

53793.jpg
12 of 19 Dan Farber/ZDNet

Craig Mundie, chief research and strategy office at Microsoft, and Bill Gates discuss the state of cybersecurity. Mundie gave the expected nod to Vista and Office 2007 as the first products run through Microsoft's security design lifecycle process. "This won't make them perfect….humans are human and they make mistakes. A large part of going forward is not just dealing with the engineering aspect…it's dealing with fact that errors do happen whether operational, design or intentional," Mundie said. The message is that Vista is made by smarter humans, but it isn't invulnerable to hackers.

53795.jpg
13 of 19 Dan Farber/ZDNet

The RSA 2007 Conference opened with a Broadway-style dance number, featuring dozens of costumed monks and two singers belting out the David Bowie/Queen song "Under Pressure," something to do with the Renaissance theme of the conference.

53794.jpg
14 of 19 Dan Farber/ZDNet

Ze Frank is hosting the RSA 2007 Conference. Check out his Web site--http://www.zefrank.com/

54209.jpg
15 of 19 Dan Farber/ZDNet

Greg Garcia heads up the U.S. government efforts cybercrime fighting efforts as assistant secretary of cybersecurity and telecommunications for the Bush administration

54210.jpg
16 of 19 Dan Farber/ZDNet

VeriSign CEO Stratton Sclavos unveiled Project Titan, boosting the capacity of its DNS network infrastructure

54211.jpg
17 of 19 Dan Farber/ZDNet
Howard Schmidt, CEO of R & H
Security Consulting and former eBay, Microsoft and White House security czar, and Bruce Schneier, author and CTO of BT Counterpane at RSA 2007
54212.jpg
18 of 19 Dan Farber/ZDNet

The adversary is sophisticated, nimble and organized, and is motivated by economic gain, causing damage, espionage, revenge and publicity, said Greg Garcia, Department of Homeland Security assistant secretary for cybersecurity and telecommunications. "They are better organized, but we are getting organized in a systematic way."

54213.jpg
19 of 19 Dan Farber/ZDNet

John Swainson, president and CEO of CA, said security services have to evolve to the point where they are available to every part of the infrastructure.

Related Galleries

First look at the YubiKey Bio
YubiKey Bio

Related Galleries

First look at the YubiKey Bio

iVerify (version 17)
iVerify for iOS and iPadOS

Related Galleries

iVerify (version 17)

OnlyKey hardware security key
OnlyKey

Related Galleries

OnlyKey hardware security key

SoloKeys Solo V2
Solo V2

Related Galleries

SoloKeys Solo V2

iVerify: Added security for iPhone and iPad users
iVerify

Related Galleries

iVerify: Added security for iPhone and iPad users

iStorage datAshur BT hardware encrypted flash drive
iStorage datAshur BT

Related Galleries

iStorage datAshur BT hardware encrypted flash drive

Netgear BR200 small-business router
Netgear BR200

Related Galleries

Netgear BR200 small-business router