Please turn on your JavaScript for this page to function normally.
encrypt - product slika
NetRandom generates, delivers true random numbers for crypto operations

At RSA Conference, Whitewood Encryption Systems has launched netRandom, a suite of products that transforms the way high-quality true random numbers are accessed across the …

backdoor
Most infosec pros consider government-mandated encryption backdoors a bad idea

Apple and the FBI have been engaged in a legal battle over the federal government’s right to require built-in smartphone encryption software that could aid law enforcement …

Cyber operations platform to automate the hunt for cyber adversaries

At RSA Conference Endgame announced the launch of a comprehensive cyber operations platform for organizations to detect, block, and evict advanced threats at the earliest …

Photo gallery: RSA Conference 2016 Expo – Moscone South

The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor of Moscone South. Featured companies: Anomali, Optiv, …

trend micro cloud app security
Trend Micro Cloud App Security integrates with Box, Dropbox and Google Drive

Trend Micro announced the expansion of its Cloud App Security at the RSA Conference. Cloud App Security enhances cloud file sharing and collaboration services and Microsoft …

vault safe
Secure passwords for privileged accounts with Bomgar Vault

At RSA Conference 2016 Bomgar announced the new Bomgar Vault, which helps companies secure, manage, and administer shared credentials for privileged users and IT vendors. …

Researcher demonstrates hijacking of police drone

A security researcher has demonstrated to the RSA Conference crowd how he – or anyone, for that matter – can take over control of a drone used by the Dutch police …

digital identity graph
Digital Identity Graph helps detect fraud, cyberattacks

ThreatMetrix announced at RSA Conference the newest innovation in the fight against global cybercrime – the Digital Identity Graph, a framework for anonymized global digital …

maritime ship cargo
Sea pirates and cyber attacks: Information security breaches in the maritime industry

The Maritime Trade Information Sharing Center, Gulf of Guinea (MTISC-GoG) has denied that it has suffered a data breach that could result in sea pirates knowing details about …

Unmanaged wearables infiltrating the enterprise

Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …

cyber microscope
New certification program for forensic security responders

Guidance Software announced at RSA Conference 2016 Certified Forensic Security Responder (CFSR) training, a certification fills the skills gap with industry-accepted tools and …

Dell SecureWorks speeds up endpoint intrusion detection, response

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …

Don't miss

Cybersecurity news