Please turn on your JavaScript for this page to function normally.
cyber microscope
New certification program for forensic security responders

Guidance Software announced at RSA Conference 2016 Certified Forensic Security Responder (CFSR) training, a certification fills the skills gap with industry-accepted tools and …

Dell SecureWorks speeds up endpoint intrusion detection, response

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …

rsac2016
Photo gallery: RSA Conference 2016 Expo – Moscone North

The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor of Moscone North. Featured companies: Qualys, RSA, …

behavior analytics
Balabit’s Blindspotter extends behavior analysis with biometrics

Balabit, best known as “the creator of syslog-ng,” announced the release of Blindspotter version 2016.03 at the RSA Conference in San Francisco. The new version of its …

Firewall barracuda
Barracuda showcases new firewall for IoT applications and deployments

At RSA Conference, Barracuda announced it has expanded its next-generation firewall product family with the addition of the new Barracuda NextGen Firewall S-Series, which is …

patching cloud
Qualys delivers scalable, cloud-based patching

Qualys announced at RSA Conference an OEM partnership with HEAT Software to deliver a cloud-based patch management offering to its global customers. The partnership allows …

keyboard
Which passwords to avoid for Internet-facing systems?

For the last year or so, Rapid7 has been collecting login credentials via “Heisenberg,” a network of low-interaction honeypots that the company has set up to analyze login …

digital pentagon
Hack the Pentagon: Hackers asked to help secure public-facing systems

The US Department of Defense (DoD) has invited hackers participate in “Hack the Pentagon”, a program aimed at finding vulnerabilities in some of the …

Building
Weak default credentials, command injection bug found in building operation software

A vulnerability in servers programmed with Schneider Electric’s StruxureWare Building Operation software can be exploited by a low-skilled, remote attacker to gain access to …

success
Crypto pioneers Diffie and Hellman win Nobel Prize of Computing

ACM, the Association for Computing Machinery has announced at RSA Conference that it has awarded crypto pioneers Whitfield Diffie and Martin E. Hellman the 2015 ACM A.M. …

connected
Open source risk management tool for Android application packages

Are there any security vulnerabilities in the open source you use? At RSA Conference, WhiteSource announced the release of the industry’s first Android Application Package …

users
Only one in five orgs set up to securely manage user identities

As organizations seek to capitalize on digital opportunities through rapidly developing and hosting new services online, they frequently under-invest in adequate cybersecurity …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools