SIGNAL Coverage: West 2017


Real-time coverage from West 2017, including blog posts, news and photos, all in one place. SIGNAL provides highlights and breaking news from speakers and panelists.

Latest Event Coverage

{'channel'}->{'item'} as $ccal) { $recctr = $recctr + 1; if ($recctr < 9) { if ($recctr >1) { echo "
 
"; } if (strlen($ccal->link) > 2) { echo "

" . $ccal->title . "

"; echo $ccal->description; }else{ echo "

" . $ccal->title . "

"; echo $ccal->description; } } } if ($recctr == 0) { echo "

Currently no entries available.

"; } else { echo "
 

Read More ..."; } ?>
  Lookout

Sponsored Content

5 non-negotiable principles to combat cyber war on mobile

The U.S. government is unprepared for cyberwar on mobile. Read a blog from Maj. Gen. Jennifer Napper, USA (Ret.) on 5 non-negotiable principles to combat it.
 

Why mobile security should be in your top priorities

"The importance of mobile security has gone from zero to 100. The number of people using their phones at work is increasing the ‘quality’ of the data on mobile devices, data bad guys want to access." - Craig Shumard, CISO emeritus. Read the eBook.
 

Gartner Market Guide for Mobile Threat Defense Solutions

"It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." - Gartner Market Guide for Mobile Threat Defense Solutions, John Girard, Dionisio Zumerle, July 2016. Read the Guide.

Lookout is FedRAMP Ready.
 

Related Coverage

{'channel'}->{'item'} as $ccal) { $recctr = $recctr + 1; if ($recctr < 4) { if ($recctr >1) { echo "
 
"; } if (strlen($ccal->link) > 2) { echo "

" . $ccal->title . "

"; echo $ccal->description; }else{ echo "

" . $ccal->title . "

"; echo $ccal->description; } } } if ($recctr == 0) { echo "

Currently no entries available.

"; } else { echo "
 

Read More ..."; } ?>



Photos from West