Please turn on your JavaScript for this page to function normally.
Wireless
A rogue access point at RSA Conference? Here’s what happened

Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a …

Past, present and future of threat intelligence platforms

In this podcast recorded at RSA Conference 2016, John Czupak and Ryan Trost, CEO and CTO of ThreatQuotient respectively, clarify the meaning of threat intelligence and …

cloud computing
Cloud computing: Security and evolution

What we’ve seen in the past 15 years is cloud computing becoming increasingly popular. Many companies have focused plenty of resources in making cloud computing the most …

Innovation Sandbox and the modern threat landscape

In this podcast, recorded at RSA Conference 2016, Ajay Arora, CEO at Vera, and Amir Ben-Efraim, CEO at Menlo Security, discuss their participation in the Innovation Sandbox …

glass building
RSA Conference 2016: The infosec glass house?

A couple of years late to the party, but I finally made it to San Francisco with a real sense of excitement to attend what was described to me as the “Super Bowl of the …

Anomali threat intelligence
Making sense of threat intelligence data in your IT environment

Threat intelligence data has been growing at an exponential rate of 39% a month. Enterprise customers are looking at around 30,000 events going into their SIEM every second. …

RSA Conference
My reflections after visiting RSA Conference 2016

RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches …

Photo gallery: RSA Conference 2016 Expo

RSA Conference 2016 ends today, and as a wrap up, here are a few more photos from the Expo floor. Featured companies: Niara, SecureAuth, Qualys, Tenable, Auconet, FireEye, Algosec.

How effective are orgs at detecting and investigating cyber threats?

A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …

WinMagic provides encryption of virtual machines running on IaaS platforms

At RSA Conference 2016 WinMagic introduced security software that encrypts virtual machines running on Infrastructure as a Service (IaaS) platforms. Addressing the growing …

Real-time detection and automatic containment of Active Directory attacks

CyberArk announced at RSA Conference new real-time threat detection and containment capabilities to help organizations secure against cyber attacks targeting Microsoft Active …

sidelines infosec professional
Cybersecurity still seen as a tech issue, not a business imperative

Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According …

Don't miss

Cybersecurity news