Email Alerts
-
RSA Conference 2013: Analysis, video and news from RSA
Updated throughout RSA Conference 2013, visit here often for the latest analysis, video and news from RSAC in San Francisco. guide
-
Black Hat 2012: Special Conference Coverage
Researchers and hackers gather in Las Vegas, and new exploit methods are sure to be revealed. Don't miss our wall-to-wall coverage. Guide
-
Download presentations from Information Security Decisions 2012
At ISD 2012, many of the industry's leading information security experts gathered to share vendor-neutral expertise and proven security strategies. Conference supplement
-
RSA Conference 2012: Special Conference Coverage
Get news from RSA Conference 2012. Cloud computing, mobile threats and attack intelligence gathering are likely to be among this year's top themes. Guide
-
RSA Conference 2012 to feature cloud computing, mobile threats
Get news from RSA Conference 2012. Cloud computing, mobile threats and attack intelligence gathering are likely to be among this year's top themes. Guide
-
RSA Conference 2012: Special Conference Coverage
Get news, videos and podcasts from RSA Conference 2012, the annual security conference in San Francisco. Cloud computing, mobile threat prevention and attack intelligence gathering and analysis are likely to be among the top themes at one of the info... guide
-
RSA Conference 2011: News, interviews and updates
The RSA Conference is a valuable resource in staying educated on the latest advances, threats and emerging trends in the information security industry. Conference Coverage
-
Black Hat 2013: Experts urge elliptical curve cryptography adoption
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC. News | 02 Aug 2013
-
Black Hat 2013 attendance nears 7,500, tops 2012
Brief: GM Trey Ford said Black Hat 2013 attendance was up by 8% compared with last year's event. Ninety-eight new tools were introduced. News | 01 Aug 2013
-
2013 Black Hat conference: Feds welcome!
Despite DefCon founder's blog telling Feds to stay home, Black Hat says they're 'welcome' at the show. News | 12 Jul 2013
-
Vendors showcase MAM products that ease BYOD challenges at RSA 2013
RSA exhibitors offered a range of mobile application management solutions, intended to ease the challenges of monitoring BYOD environments. News | 27 Feb 2013
-
RSA 2013: Charney optimistic about the future of information security
In his RSA Conference 2013 keynote, Microsoft's Scott Charney struck an optimistic note when talking about the future of information security. News | 27 Feb 2013
-
Big data 2.0: CISOs push need to identify attack campaigns
CISOs at RSA Conference 2013 say identifying attack campaigns means taking security big data to the next level. The hard part? Finding data analysts. News | 27 Feb 2013
-
Coviello pitches 'transformational' information security strategy
In a talk critical of cyberattack finger-pointing, Art Coviello stressed the need for infosec strategy to emphasize big data, interconnectivity. News | 26 Feb 2013
-
Security B-Sides presenter questions value of penetration testing
At Security B-Sides San Francisco, Brett Hardin asked why organizations hire penetration testers and assessed the value of penetration testing. News | 26 Feb 2013
-
Special coverage: Black Hat 2012
This is the place for all the news, analysis, commentary and video interviews direct from the annual hacker event in Las Vegas. News | 26 Jul 2012
-
HP releases new SIRM platform for risk management
HP released a new security intelligence and risk management platform, integrating security technologies from its portfolio of security products. News | 14 Mar 2012
- See more News on News and analysis from IT security conferences
-
Oracle security patches, InfoSec World 2012 controversy offer important lessons
Editor Eric B. Parizo says controversies involving Oracle security patches and InfoSec World 2012 prove the importance of differing opinions. Opinion
-
Dan Kaminsky offers unconventional wisdom on security innovation
Luminary Dan Kaminsky, known for his DNS research, pushed RSA Conference 2012 attendees toward security innovation by upending conventional wisdom. Column
-
offensive security
Offensive security is a proactive and antagonistic approach to protecting computer systems, networks and individuals from attacks. Definition
-
Jim Reavis on cloud transparency, cloud security trends
In this video from RSA Conference 2012, CSA Executive Director Jim Reavis talks about the group’s projects and building cloud security trust. Video
-
Tim Rains on cloud computing security standards, provider transparency
In this video from RSA Conference 2012, Microsoft’s Tim Rains talks about emerging cloud security standards efforts and customers need for visibility into cloud provider security. Video
-
Bruce Schneier tackles sociology of trust and security
Bruce Schneier’s new book Liars and Outliers takes a deep dive into the evolution of trust and the sociology of security. Video
-
Ernie Hayden on ICS, SCADA system security issues
ICS and SCADA system security expert Ernie Hayden of Verizon discusses key exploit areas and the threat SCADA systems pose to national security. Video
-
Gary McGraw on secure software development, BSIMM study
Getting a handle of your software security processes is not easy, but noted software security expert Gary McGraw says forward learning organizations share some similarities. Video
-
Kevin Mahaffey: Mobile security technologies are just emerging
Kevin Mahaffey, CTO of mobile security firm Lookout, says innovative mobile security technologies are on the horizon. Video
-
Q&A: The state of the Microsoft Trustworthy Computing initiative in 2011
In this exclusive video interview from RSA Conference 2011, Microsoft Corporate Vice President of Trustworthy Computing Scott Charney and SearchSecurity.com Senior Site Editor Eric B. Parizo discuss the state of Microsoft's Trustworthy Computing init... Video
-
Stuxnet malware analysis video with expert Bruce Schneier
In this RSA Conference 2011 interview, Michael Mimoso, Editorial Director of the Security Media Group at TechTarget interviews Bruce Schneier, Chief Security Technology Officer of BT Group discusses Stuxnet malware analysis. Video
-
Black Hat 2013: Experts urge elliptical curve cryptography adoption
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC. News
-
Black Hat 2013 attendance nears 7,500, tops 2012
Brief: GM Trey Ford said Black Hat 2013 attendance was up by 8% compared with last year's event. Ninety-eight new tools were introduced. News
-
2013 Black Hat conference: Feds welcome!
Despite DefCon founder's blog telling Feds to stay home, Black Hat says they're 'welcome' at the show. News
-
Vendors showcase MAM products that ease BYOD challenges at RSA 2013
RSA exhibitors offered a range of mobile application management solutions, intended to ease the challenges of monitoring BYOD environments. News
-
RSA 2013: Charney optimistic about the future of information security
In his RSA Conference 2013 keynote, Microsoft's Scott Charney struck an optimistic note when talking about the future of information security. News
-
Big data 2.0: CISOs push need to identify attack campaigns
CISOs at RSA Conference 2013 say identifying attack campaigns means taking security big data to the next level. The hard part? Finding data analysts. News
-
Coviello pitches 'transformational' information security strategy
In a talk critical of cyberattack finger-pointing, Art Coviello stressed the need for infosec strategy to emphasize big data, interconnectivity. News
-
Security B-Sides presenter questions value of penetration testing
At Security B-Sides San Francisco, Brett Hardin asked why organizations hire penetration testers and assessed the value of penetration testing. News
-
RSA Conference 2013: Analysis, video and news from RSA
Updated throughout RSA Conference 2013, visit here often for the latest analysis, video and news from RSAC in San Francisco. guide
-
offensive security
Offensive security is a proactive and antagonistic approach to protecting computer systems, networks and individuals from attacks. Definition
- See more All on News and analysis from IT security conferences
Security Management Strategies for the CIO