News and analysis from IT security conferences News
March 27, 2015
News roundup: The ban of "booth babes" at RSA Conference 2015 has been met with praise; does it equal an increase of women in infosec? Plus: Cyberthreat data-sharing bill advances; Flash flaw exploited days after patching; new twist on Google Play ...
November 10, 2014
At the 2014 Advanced Cyber Security Center conference, industry experts touted the increasing importance of information sharing and incident preparation, yet also admitted both are easier said than done.
March 05, 2014
Expert Kevin Beaver shares his highlights of RSA Conference 2014 and offers advice on how to apply the knowledge learned at this year's event.
February 28, 2014
Security vendors often claim that attackers are unpredictable, but two Verizon DBIR researchers say better data can find recognizable patterns.
News and analysis from IT security conferences Get Started
Bring yourself up to speed with our introductory content
Find out what's happening in the infosec industry with breaking news via reporting, video and tweets by the SearchSecurity team at RSA's 2014 conference in San Francisco. Continue Reading
Updated throughout RSA Conference 2013, visit here often for the latest analysis, video and news from RSAC in San Francisco. Continue Reading
Researchers and hackers gather in Las Vegas, and new exploit methods are sure to be revealed. Don't miss our wall-to-wall coverage. Continue Reading
Evaluate News and analysis from IT security conferences Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Several information security topics emerged as hot topics at RSA 2014. Learn three security topics enterprises should keep on their radar. Continue Reading
Blogger and security pro Kevin Beaver says the opening keynotes at RSA 2014 show that the same information security mistakes happen over and over. Continue Reading
Executive Editor Eric B. Parizo explains why the 2014 RSA Conference boycott, like the MLB Hall of Fame voting, is driven by a crisis of conscience. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage News and analysis from IT security conferences
Learn to apply best practices and optimize your operations.
Researchers delivered their 2014 outlook on cyberthreats at the RSA Conference, highlighting attack techniques and ways to defend against them. Continue Reading
Get news, analysis and video from RSA Conference 2014. Continue Reading
HP released a new security intelligence and risk management platform, integrating security technologies from its portfolio of security products. Continue Reading
Problem Solve News and analysis from IT security conferences Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Akamai Technologies’ limited release Kona Site Defender will be demonstrated at the 2012 RSA conference and widely available in April. Continue Reading