Identity, data governance across all apps, systems, and devices
At RSA Conference 2015, Deep Identity announced their expansion into London, UK, and the release of version 5 of their Identity and Data Governance Suite. Key features of the …
At RSA Conference 2015, Deep Identity announced their expansion into London, UK, and the release of version 5 of their Identity and Data Governance Suite. Key features of the …
A new technology, called Blind Hashing, that prevents offline password attacks by making databases impossible to steal, has been introduced at RSA Conference 2015 by start-up …
ThreatStream announced at RSA Conference 2015 that Cyber Defense Magazine has named them winner of the Cutting Edge award in the Enterprise Security Solutions category. The …
If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …
Cryptzone unveiled its next-generation access control solution at the RSA Conference 2015. AppGate Secure Access is based on the Software Defined Perimeter (SDP) model, which …
At RSA Conference 2015, Norse introduced the Norse Intelligence Service, a unique fusion of automated and human threat monitoring and analysis that offers “early warning …
Today, at the RSA Conference 2015, (ISC)2 and the CSA announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP represents the advanced skills …
The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in …
Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …
The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …
Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …
TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …