Help Net Security
Discover, classify, protect and analyze data with TITUS Illuminate
According to a recent Forrester report, data discovery and classification is an often-overlooked yet critical component of data security and control. Today, at RSA Conference …
Top 12 cloud computing threats in 2016
The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …
The everyday application interactions putting enterprises at risk
With greater awareness about the risks of unsecured privileged accounts allowing broad, anonymous access across the enterprise, privileged account security has become an …
Security audit identified risky e-filing tax services
The Online Trust Alliance (OTA) evaluated the privacy, security and consumer protection practices of the thirteen IRS-approved free e-filing tax services. After an assessment …
Senior level perceptions about SAP security
More than half of companies believe it is likely their company would have a data breach due to insecure SAP applications, according to a new Ponemon Institute study. This same …
Photo gallery: RSA Conference 2016
The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos of the first day of the conference, with the Expo Floor still being set up, …
Endpoint Protector: Fight data leakage on Linux workstations
At RSA Conference 2016 in San Francisco, CoSoSys released Endpoint Protector DLP for Linux in Private Beta, enabling protection against data leakages for confidential data on …
Privileged identity management for SSH keys
ManageEngine launched Key Manager Plus, a comprehensive, Web-based, SSH key management solution at RSA Conference 2016. Available immediately, the new product joins …
Qualys releases app for ServiceNow Configuration Management Database
Qualys announced it has received certification of its application with ServiceNow. The Qualys App for ServiceNow CMDB is an application that synchronizes Qualys IT asset …
Identifying abuse of compromised credentials in real-time
DB Networks announced at RSA Conference industry-first capabilities to non-intrusively identify compromised credentials in real-time by uniquely applying machine learning and …
Employee and HR data is the most commonly encrypted data
The use of encryption continues to grow in response to cyber-attacks, privacy compliance regulations and consumer concerns, and the majority of organizations plan to transfer …
War Room app for enterprise incident response and collaboration
Today at RSA Conference, Rook Security introduced War Room, an enterprise app that provides real-time unified incident and crisis management collaboration in the cloud. …
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed