SIGNAL Coverage: West 2020

Real-time coverage from WEST 2020, including blog posts, news and photos, all in one place. SIGNAL provides highlights and breaking news from speakers and panelists.

Latest Event Coverage

{'channel'}->{'item'} as $ccal) { $recctr = $recctr + 1; if ($recctr < 9) { if ($recctr >1) { echo "
 
"; } if (strlen($ccal->link) > 2) { echo "

" . $ccal->title . "

"; echo $ccal->description; }else{ echo "

" . $ccal->title . "

"; echo $ccal->description; } } } if ($recctr == 0) { echo "

Currently no entries available.

"; } else { echo "
 

Read More ..."; } ?>
 

 

Sponsored Content

Filter Data or Fail – It’s your security choice.

Information sharing is crucial for mission success, and antivirus only looks for known-bad malicious content. It’s just not enough. Data that may seem normal can carry hidden unknowns that can corrupt vital systems across domains.

Network security assurance is an essential part of your defensive security posture, but without hardware-enforced policy and known-good deep content inspection (DCI), you can’t guarantee that embedded attacks aren’t crossing your network boundary.

Owl DCI technology examines and validates the file structure, recursively extracting file elements to the most basic components. Then, it examines each against a set of rules, specifying what is allowed in or out of a network domain.

Swoop by Owl Cyber Defense’s Booth #1818 this week to learn more about how deep content inspection on the world's most advanced cross domain solutions can keep your data clean and network safe. Read More.

Related Coverage

{'channel'}->{'item'} as $ccal) { $recctr = $recctr + 1; if ($recctr < 4) { if ($recctr >1) { echo "
 
"; } if (strlen($ccal->link) > 2) { echo "

" . $ccal->title . "

"; echo $ccal->description; }else{ echo "

" . $ccal->title . "

"; echo $ccal->description; } } } if ($recctr == 0) { echo "

Currently no entries available.

"; } else { echo "
 

Read More ..."; } ?>