RSA Conference 2016
NetRandom generates, delivers true random numbers for crypto operations
At RSA Conference, Whitewood Encryption Systems has launched netRandom, a suite of products that transforms the way high-quality true random numbers are accessed across the …
Most infosec pros consider government-mandated encryption backdoors a bad idea
Apple and the FBI have been engaged in a legal battle over the federal government’s right to require built-in smartphone encryption software that could aid law enforcement …
Cyber operations platform to automate the hunt for cyber adversaries
At RSA Conference Endgame announced the launch of a comprehensive cyber operations platform for organizations to detect, block, and evict advanced threats at the earliest …
Photo gallery: RSA Conference 2016 Expo – Moscone South
The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor of Moscone South. Featured companies: Anomali, Optiv, …
Trend Micro Cloud App Security integrates with Box, Dropbox and Google Drive
Trend Micro announced the expansion of its Cloud App Security at the RSA Conference. Cloud App Security enhances cloud file sharing and collaboration services and Microsoft …
Secure passwords for privileged accounts with Bomgar Vault
At RSA Conference 2016 Bomgar announced the new Bomgar Vault, which helps companies secure, manage, and administer shared credentials for privileged users and IT vendors. …
Researcher demonstrates hijacking of police drone
A security researcher has demonstrated to the RSA Conference crowd how he – or anyone, for that matter – can take over control of a drone used by the Dutch police …
Digital Identity Graph helps detect fraud, cyberattacks
ThreatMetrix announced at RSA Conference the newest innovation in the fight against global cybercrime – the Digital Identity Graph, a framework for anonymized global digital …
Sea pirates and cyber attacks: Information security breaches in the maritime industry
The Maritime Trade Information Sharing Center, Gulf of Guinea (MTISC-GoG) has denied that it has suffered a data breach that could result in sea pirates knowing details about …
Unmanaged wearables infiltrating the enterprise
Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …
New certification program for forensic security responders
Guidance Software announced at RSA Conference 2016 Certified Forensic Security Responder (CFSR) training, a certification fills the skills gap with industry-accepted tools and …
Dell SecureWorks speeds up endpoint intrusion detection, response
Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …
Featured news
Resources
Don't miss
- Mitel MiCollab zero-day and PoC exploit unveiled
- 8 US telcos compromised, FBI advises Americans to use encrypted communications
- Download: The Ultimate Guide to the CCSP
- Preparing for Q-day: The essential role of cloud migration in securing enterprise data
- How the Shadowserver Foundation helps network defenders with free intelligence feeds