Please turn on your JavaScript for this page to function normally.
Week in review: Facebook CSO interview, RSA Conference 2012 coverage

Here’s an overview of some of last week’s most interesting news, videos, interviews and podcasts: RSA Conference 2012 coverage Last week, the Help Net Security …

Locate and analyze deployed digital certificates for free

Venafi announced the availability of Venafi Assessor, a downloadable, easy-to-install, free software solution that scans an organization ‘s network to locate and analyze …

Identity, app and mobile device monitoring

Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively …

Trusted Computing Group unveils new membership option

Open industry standards organization Trusted Computing Group announced it has created a new membership option, the Associate, targeted to enterprise users, service providers, …

Real-time session monitoring by Cyber-Ark

Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …

Protection for data in the cloud

Fasoo announced three security solutions that enable protection for data in the cloud. The Fasoo Usage Tracer (FUT) enables information governance by allowing organizations to …

Metasploit identifies IPv6 security risks

Rapid7 announced that the new version of its penetration testing solution, Rapid7 Metasploit 4.2, allows organizations to assess the security posture of IPv6 enabled systems. …

Trend Micro unveils APT management solution

Trend Micro announced Deep Discovery, a threat management solution designed to help large enterprise and government organizations combat advanced persistent threats (APTs) and …

A walk through the expo at RSA Conference 2012, part three

The RSA Conference expo continues to draw large crowds each day. Here’s another look at the show floor, with more interesting booths. For up-to-date conference news and …

40% of UK businesses breached due to spam

Businesses are still struggling to deal with the problems caused by spam, and nearly half of them have experienced a data breach as a result of employees clicking on malicious …

A holistic view of threat and vulnerability risk

Rapid7 and Modulo announced they are working together to deliver an holistic view of threat and vulnerability risk, correlated with broader regulatory, policy and compliance …

Virtual scanners for consultants, enterprises and the cloud

Qualys announced virtual scanner appliances for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance. The new software-based virtual …

Don't miss

Cybersecurity news