Please turn on your JavaScript for this page to function normally.
business
Identity, data governance across all apps, systems, and devices

At RSA Conference 2015, Deep Identity announced their expansion into London, UK, and the release of version 5 of their Identity and Data Governance Suite. Key features of the …

password
Making password databases impossible to steal

A new technology, called Blind Hashing, that prevents offline password attacks by making databases impossible to steal, has been introduced at RSA Conference 2015 by start-up …

light
ThreatStream wins the Cutting Edge award

ThreatStream announced at RSA Conference 2015 that Cyber Defense Magazine has named them winner of the Cutting Edge award in the Enterprise Security Solutions category. The …

London
IoT creates new set of risks, orgs embrace active defense

If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …

labyrinth
Secure dynamic perimeters in cloud and hybrid environments

Cryptzone unveiled its next-generation access control solution at the RSA Conference 2015. AppGate Secure Access is based on the Software Defined Perimeter (SDP) model, which …

Storm
Early-warning-as-a-service for extended enterprise networks

At RSA Conference 2015, Norse introduced the Norse Intelligence Service, a unique fusion of automated and human threat monitoring and analysis that offers “early warning …

RSA Conference 2015
New cloud security certification from (ISC)2 and CSA

Today, at the RSA Conference 2015, (ISC)2 and the CSA announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP represents the advanced skills …

Use of encryption continues to rise

The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in …

Fox-IT launches cyberthreat management platform

Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …

Binary
Security guidance for early IoT adopters

The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …

Red door
Real-time traffic analysis and inventory of virtualized assets

Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …

shadow
Organizations continue to rely on outdated technologies

TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …

Don't miss

Cybersecurity news