	{"id":86176,"date":"2019-03-15T00:00:17","date_gmt":"2019-03-15T07:00:17","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=86176"},"modified":"2019-10-01T07:40:47","modified_gmt":"2019-10-01T14:40:47","slug":"rsa-conference-2019-highlights-a-mac-perspective","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/","title":{"rendered":"RSA Conference 2019 highlights: a Mac perspective"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-86227\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_600x300.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_600x300.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_600x300-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_600x300-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Another RSA Conference has ended, and as usual, there were a lot of great things at the event.<\/p>\n<p><strong>RSA Conference USA 2019<\/strong> was held at the Moscone Center and the Marriott Marquis in San Francisco, California.<\/p>\n<p>Although Apple doesn&#8217;t exhibit or participate in trade show events in any official capacity, whenever I attend, I look for the Apple-relevant content, and often find some great hidden gems. In this article, I&#8217;ll point out some of the keynotes that were of general interest to anyone interested in digital security and privacy, and then I&#8217;ll cover a couple of Mac-focused things from the event.<\/p>\n<h3>The Cryptographers&#8217; Panel<\/h3>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/Jhd2N2KNSXY?start=360\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\nEvery year, a panel of notable cryptographers gathers on stage to cryptography topics du jour. Ron Rivest (the R in RSA) and several others were on the panel this year, but\u00a0one of the usual panelists, Adi Shamir (the S in RSA), was unfortunately unable to attend because he was unable to obtain a visa.<\/p>\n<p>RSAC&#8217;s official YouTube channel has a video of the panel discussion (embedded above for your convenience). Here are a few notable sections of the discussion:<\/p>\n<ul>\n<li>(12:24 to 16:33) <strong>Australia&#8217;s Telecommunications and Other Legislation Amendment (Assistance and Access) Act of 2018<\/strong>\u2014which has some terribly chilling implications for local as well as global information security\u2014is discussed\n<ul>\n<li>we also discussed this topic on <a href=\"http:\/\/podcast.intego.com\/67\" target=\"_blank\" rel=\"noopener\">episode 67<\/a> of the Intego Mac Podcast).<\/li>\n<\/ul>\n<\/li>\n<li>(16:44 to 20:00) <strong>The EU&#8217;s\u00a0General Data Protection Regulation (GDPR)<\/strong>\u00a0and <strong>California&#8217;s Consumer Privacy Act of 2018<\/strong>\u00a0(which will take effect January 1, 2020) are discussed\n<ul>\n<li>we also discussed GDPR on <a href=\"http:\/\/podcast.intego.com\/32\">episode 32<\/a> of the Intego Mac Podcast<\/li>\n<li>you can learn more about California&#8217;s Consumer Privacy Act <a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375&amp;search_keywords=California+Consumer+Privacy+Act+of+2018\" target=\"_blank\" rel=\"noopener\">here<\/a><\/li>\n<\/ul>\n<\/li>\n<li>(24:03 to 28:21) <strong>Voting system security<\/strong> is discussed, including whether it&#8217;s better to use paper ballots than try to secure digital voting systems<\/li>\n<\/ul>\n<h3>Bruce Schneier on The Role of Security Technologies in Public Policy<\/h3>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/86w_XzlZ7GM\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\nBruce Schneier is something of an information security rockstar, so it&#8217;s always interesting to hear him speak on a topic about which he is passionate. You can watch his session above; its description is as follows:<\/p>\n<blockquote><p>&#8220;Computer security is now a public policy issue. But while an understanding of the technology involved is fundamental to crafting good policy, there is little involvement of technologists in policy discussions. We need public-interest technologists: people from our fields helping craft policy. This is increasingly critical to both public safety and overall social organization. The defining policy question of the Internet age is this: How much of our lives should be governed by technology, and under what terms? We need to be involved in that discussion.&#8221;<\/p><\/blockquote>\n<p>Schneier suggests that knowledgeable information security specialists should volunteer time to help shape public policy regarding security and privacy topics.<\/p>\n<h3>The Five Most Dangerous New Attack Techniques and How to Counter Them<\/h3>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/sibeN4U1fOg\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Another panel discussion that I look forward to every year is the &#8220;most dangerous attacks&#8221; panel hosted by experts from the SANS Technology Institute. You can watch the video above.<\/p>\n<ul>\n<li>Ed Skoudis discussed the increase in &#8220;DNS mischief&#8221; and domain fronting<\/li>\n<li>Heather Mahalik discussed targeted, individualized attacks, including &#8220;someone in your cloud&#8221;<\/li>\n<li>Johannes Ullrich discussed more DNS attacks as well as CPU flaws and other hardware exploits<\/li>\n<\/ul>\n<h3>Kyla Guru, Tales of a Teenage Security Supergirl<\/h3>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/ZKvc5YsgMOY\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\nOne of the most impressive keynotes at the conference was that of Kyla Guru, a 16-year-old high school student who started her own cybersecurity education company.<\/p>\n<p>Guru pointed out that our schools emphasize physical safety, but are generally doing a poor job of teaching digital and online safety and security. You can watch her thought-provoking keynote above.<\/p>\n<h3>New Mac software (for geeks only)<\/h3>\n<p>A few pieces of interesting Mac software were announced or released at the conference last week, but each is highly specialized and only of interest to the information security community.<\/p>\n<ul>\n<li><strong>AutoMacTC<\/strong>, developed by CrowdStrike, is a Python-based framework for digital forensics on macOS<\/li>\n<li><strong>Ghidra<\/strong>, developed by the NSA (yep, the U.S. National Security Agency), is a cross-platform (Java-based) reverse engineering tool that works on Macs, and is a free alternative to popular but typically expensive tools such as IDA Pro<\/li>\n<li><strong>MonitorKit<\/strong>, developed by Digita Security, is a behavior-based malware detection framework that utilizes Apple&#8217;s GameKit engine<\/li>\n<\/ul>\n<h3>How can I learn more?<\/h3>\n<p>RSA Conference typically releases additional videos in the weeks following the conference on the <a href=\"https:\/\/www.youtube.com\/user\/RSAConference\/videos\" target=\"_blank\" rel=\"noopener\">RSAC YouTube channel<\/a>. (Also\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\">subscribe to Intego&#8217;s YouTube channel<\/a>\u00a0for\u00a0great videos on Apple security topics!)<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>Every week, Intego&#8217;s experts discuss Apple security on the <strong>Intego Mac Podcast<\/strong>, so be sure to <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> to make sure you don&#8217;t miss the latest episode. You&#8217;ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for updates.<\/p>\n<p><em>Was there anything else of interest to Apple users at RSA Conference that we missed? Let us know in the comments below.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another RSA Conference has ended, and as usual, there were a lot of great things at the event. RSA Conference USA 2019 was held at the Moscone Center and the Marriott Marquis in San Francisco, California. Although Apple doesn&#8217;t exhibit or participate in trade show events in any official capacity, whenever I attend, I look [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":86230,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[2098,3298],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Another RSA Conference has ended, and as usual, there were a lot of great things at the event. RSA Conference USA 2019 was held at the Moscone Center and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSA Conference 2019 highlights: a Mac perspective - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Another RSA Conference has ended, and as usual, there were a lot of great things at the event. RSA Conference USA 2019 was held at the Moscone Center and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-15T07:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-01T14:40:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png\",\"width\":400,\"height\":260,\"caption\":\"RSAC 2019 logo\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/\",\"name\":\"RSA Conference 2019 highlights: a Mac perspective - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#primaryimage\"},\"datePublished\":\"2019-03-15T07:00:17+00:00\",\"dateModified\":\"2019-10-01T14:40:47+00:00\",\"description\":\"Another RSA Conference has ended, and as usual, there were a lot of great things at the event. RSA Conference USA 2019 was held at the Moscone Center and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RSA Conference 2019 highlights: a Mac perspective\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"RSA Conference 2019 highlights: a Mac perspective\",\"datePublished\":\"2019-03-15T07:00:17+00:00\",\"dateModified\":\"2019-10-01T14:40:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#webpage\"},\"wordCount\":796,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png\",\"keywords\":[\"RSA\",\"RSA Conference\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Another RSA Conference has ended, and as usual, there were a lot of great things at the event. RSA Conference USA 2019 was held at the Moscone Center and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/","og_locale":"en_US","og_type":"article","og_title":"RSA Conference 2019 highlights: a Mac perspective - The Mac Security Blog","og_description":"Another RSA Conference has ended, and as usual, there were a lot of great things at the event. RSA Conference USA 2019 was held at the Moscone Center and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2019-03-15T07:00:17+00:00","article_modified_time":"2019-10-01T14:40:47+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png","width":400,"height":260,"caption":"RSAC 2019 logo"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/","name":"RSA Conference 2019 highlights: a Mac perspective - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#primaryimage"},"datePublished":"2019-03-15T07:00:17+00:00","dateModified":"2019-10-01T14:40:47+00:00","description":"Another RSA Conference has ended, and as usual, there were a lot of great things at the event. RSA Conference USA 2019 was held at the Moscone Center and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"RSA Conference 2019 highlights: a Mac perspective"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"RSA Conference 2019 highlights: a Mac perspective","datePublished":"2019-03-15T07:00:17+00:00","dateModified":"2019-10-01T14:40:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#webpage"},"wordCount":796,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png","keywords":["RSA","RSA Conference"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2019-highlights-a-mac-perspective\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/RSAC-2019_400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-mpW","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/86176"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=86176"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/86176\/revisions"}],"predecessor-version":[{"id":87430,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/86176\/revisions\/87430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/86230"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=86176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=86176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=86176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}