RSA Conference 2012
Top three security concerns for CSOs and CIOs
The breakneck speed of technology evolution, the ever changing threat landscape, and the increasing flexibility, ingenuity and persistence of cyber attackers have made …
Three BYOD problems that need to be solved
The Bring Your Own Device (BYOD) phenomenon has long stopped being just a fad and the option has become a crucial part of keeping employees and contractors happy and …
Top concern? Mobile device vulnerability management
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …
The evolution of malware and the threat landscape
The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT …
Video: Art Coviello interviews Tony Blair
At the RSA Conference 2012 in San Francisco last week, Art Coviello, Executive Vice President of EMC interviewed Tony Blair, former Prime Minister of Great Britian.
Encryption and key management as strategic business issues
Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organization’s encryption strategy, according to Richard Moulds, …
Identity, app and mobile device monitoring
Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively …
Trusted Computing Group unveils new membership option
Open industry standards organization Trusted Computing Group announced it has created a new membership option, the Associate, targeted to enterprise users, service providers, …
Real-time session monitoring by Cyber-Ark
Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …
Protection for data in the cloud
Fasoo announced three security solutions that enable protection for data in the cloud. The Fasoo Usage Tracer (FUT) enables information governance by allowing organizations to …
Video: RSA Conference 2012 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2012. Here’s a closer look at the show. For …
Trend Micro unveils APT management solution
Trend Micro announced Deep Discovery, a threat management solution designed to help large enterprise and government organizations combat advanced persistent threats (APTs) and …
Featured news
Resources
Don't miss
- Resecurity introduces AI-powered GSOC at NATO Edge 2024
- Windows, macOS users targeted with crypto-and-info-stealing malware
- How to choose secure, verifiable technologies?
- December 2024 Patch Tuesday forecast: The secure future initiative impact
- Building a robust security posture with limited resources