The RSA Conference is the information security industry's biggest annual conference. The show runs from Feb. 24-28 at the Moscone Center in San Francisco. Check back often to find out if RSA 2014 will address criticism about its ties to the NSA and secret surveillance programs. Read our editors' on-site coverage of breaking news and the issues facing information security pros. Visit this one-stop shop to get all the news that matters from RSA Conference 2014.
or not, infosec giants on the defensive
The 2014 RSA Conference boycott fizzled, but RSA, Microsoft and other companies aggressively spoke out against allegations that they have ever colluded with the National Security Agency.
U.S. data privacy laws offer little protection from FBI seizures
Attorney Marcia Hofmann says without new data privacy laws, the FBI can strong-arm providers into handing over customers' sensitive data.
2014 DBIR preview Verizon says data breach response gap widening
Verizon is touting its largest-ever data set for the 2014 DBIR, but the gap is widening between when breaches happen and when they're discovered.
Advanced attacks and defenses
Whether it's mega-DDoS attacks, nation-state cyberespionage or tried-and-true methods like phishing, the cyberattack landscape has never been more diverse and dangerous. Learn about the latest cyberattack trends and defense tactics from experts at RSA Conference 2014.
RSA says it adopted the Dual EC algorithm in 2004, meaning an alleged 2006 NSA payoff makes no sense. But there are plausible explanations. Continue Reading
On the eve of RSA Conference 2014, Cisco announced a new security strategy, new products via its Sourcefire acquisition. Continue Reading
The opening keynotes at RSA 2014 show that the same information security mistakes happen over and over. Continue Reading
After RSA 2014, are we any closer to understanding RSA's relationship with the NSA? Continue Reading
FBI director James Comey tells RSA Conference 2014 that surveillance is necessary, but promises to ensure privacy Continue Reading
Microsoft and its partners have defended disrupting criminal botnets at RSA Conference 2014 Continue Reading
In his 2014 RSA Conference keynote, Art Coviello downplayed RSA's relationship with NSA, inferring different NSA groups cause perception problems. Continue Reading
At the inaugural TrustyCon event, F-Secure's Mikko Hypponen decried the lack of trust in security vendors like RSA and warned of government malware. Continue Reading
Blogger and security pro Kevin Beaver says the opening keynotes at RSA 2014 show that the same information security mistakes happen over and over. Continue Reading
Security vendors often claim that attackers are unpredictable, but two Verizon DBIR researchers say better data can find recognizable patterns. Continue Reading
Cloud, BYOD and big data
Cloud computing, big data and the consumerization of IT are having a tremendous effect on enterprise information security programs. Learn what experts and practitioners are doing to get ahead of the negative security implications of emerging technologies.
A trio of CISOs said that SIEM still has its uses, but when it comes to big data analytics, tools like Splunk are needed. Continue Reading
Panelists at the 2014 Cloud Security Alliance Summit assert that federated identity and gateways are best for BYOD SaaS security. Continue Reading
Several information security topics emerged as hot topics at RSA 2014. Learn three security topics enterprises should keep on their radar. Continue Reading
Expert Kevin Beaver shares his highlights of RSA Conference 2014 and offers advice on how to apply the knowledge learned at this year's event. Continue Reading
Until a common cloud provider assessment paradigm is agreed upon, experts say enterprises will be left wanting on cloud data security validation. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Enterprise security management issues
How can an organization survive a data breach? What emerging information protection tactics really matter? Watch right here as we post the answers to these and other vexing enterprise information security management questions posed at RSA Conference 2014.
Eric B. Parizo explains why the 2014 RSA Conference boycott and the MLB Hall of Fame steroids controversy are part of the same story. Continue Reading
According to a panel of experts at RSA 2014, the adoption of security standards to enable automated self-healing systems is key to data protection in the future. Continue Reading
Much ink has been spilled about potential boycotts of the 2014 RSA Conference, but most signs indicate that this week's event will be business as usual. Continue Reading
Organisations running Windows XP should migrate to a more recent version of the operating system for security reasons, says Microsoft Continue Reading
At RSA Conference 2014, HP's Art Gilliland says enterprise security strategy must shift toward smarter spending based on security threat research. Continue Reading
Speakers at RSA Conference 2014 said information security incident response teams must identify and prep key participants well before incidents occur. Continue Reading
4Filmed at the show-
RSA 2014 video
Our editors and reporters talk with security experts on the hottest topics emerging from this year's RSA conference.
Video: Security luminary Bruce Schneier details his role in the NSA surveillance revelations and hints at the release of new Edward Snowden documents.
Video: Martin Roesch discusses Cisco's plans to combine its policy-centric security technology with Sourcefire's threat-focused products.
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.
Tenable CSO Marcus Ranum says he's surprised at how little information the NSA seems to have about which documents were stolen by Edward Snowden.
Video: Cryptography Research Inc. president Paul Kocher details how the ongoing NSA encryption-cracking scandal affects trusted crypto algorithms.
Randy Trzeciak reviews recent data breach incidents and details the insider threat prevention controls that may have thwarted those attacks.
Video: Sophos' Chester Wisniewski explains why targeted malware and the presence of Windows XP are the biggest threats to point-of-sale security.
5Live Tweets on RSA 2014-
RSA coverage on Twitter
Tweets from our reporters, editors and experts at the show.
Tweets from SearchSecurity reporters