News and analysis from IT security conferences News
October 01, 2015
Brian Krebs, Art Coviello and Kris Lovejoy tackle government conflicts and cybersecurity shortcomings at the Privacy. Security. Risk. 2015 event.
September 23, 2015
In a keynote address, FBI CISO Arlette Hart tackled the Internet of Things and explained why enterprises need to step up their IoT security efforts.
August 28, 2015
Video: SearchSecurity spoke with Tenable co-founder Ron Gula about recent additions to the Nessus feature set, including a version that lives in the cloud.
August 27, 2015
An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.
News and analysis from IT security conferences Get Started
Bring yourself up to speed with our introductory content
Renee Guttmann, vice president of the Office of the CISO at Accuvant, talks to SearchSecurity about security leadership, and offers advice to today's aspiring CISOs. Continue Reading
Security expert Bruce Schneier says his new book, Data and Goliath, lays out a compelling case against government mass surveillance. Continue Reading
Find out what's happening in the infosec industry with breaking news via reporting, video and tweets by the SearchSecurity team at RSA's 2014 conference in San Francisco. Continue Reading
Evaluate News and analysis from IT security conferences Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
We spoke with Tenable co-founder Ron Gula about current trends in security, such as threat intelligence services and the Internet of Things. Continue Reading
Wearables are the next wave of BYO devices infiltrating the enterprise. Domingo Guerra, president and co-founder of Appthority, talked to SearchSecurity at RSA Conference 2015 about how to address the onslaught. Continue Reading
Secure software expert Gary McGraw says the Internet of Things is going to test our abilities to learn from past failures to plan. Continue Reading
Product ReviewsPowered by IT Central Station
Provides a target response time of one minute for both hardware and software issues— and immediate escalation to level-two advanced support for high-severity issues.Powered by IT Central Station
After the release of our first product we had a lot more exposure with the public and we knew we would attract some unwanted attention. We started...Continue Reading
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
Powered by IT Central Station
Valuable Features: Firewall mode AnyConnect gateway Client-less SSL VPN • Improvements to My Organization: The versatility of the...Continue Reading
Manage News and analysis from IT security conferences
Learn to apply best practices and optimize your operations.
John Dickson, principal at Denim Group, talks to SearchSecurity at RSA Conference 2015 about tried and true ways security admins have been able to attain security dollars despite tight resources. Continue Reading
Secure software expert Gary McGraw says the IEEE Center for Secure Design can help companies find patterns in their software security flaws. Continue Reading
A panel discussion at RSA Conference 2015 outlined strategic methods enterprises can use to build and advocate for an insider threat program. Continue Reading
Problem Solve News and analysis from IT security conferences Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
At RSA 2015, Appthority president and co-founder Domingo Guerra outlines emerging mobile security risks enterprises must be aware of -- and the issues aren't limited to just bring your own devices (BYOD). Continue Reading
Akamai Technologies’ limited release Kona Site Defender will be demonstrated at the 2012 RSA conference and widely available in April. Continue Reading