Help Net Security

BalaBit releases syslog-ng Premium Edition with Big Data support
At RSA Conference 2015, BalaBit announced an improved version of the company’s syslog-ng Premium Edition 5F3 featuring enhanced support for big data environments, which …

Photos: RSA Conference 2015, part 3
RSA Conference 2015 is underway in San Francisco. For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: ThreatStream, …

Photos: RSA Conference 2015, part 2
RSA Conference 2015 is underway in San Francisco. For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: Qualys, …

Waratek named Most Innovative Company
Waratek was named the “Most Innovative Company at RSA Conference 2015” as part of the 10th annual Innovation Sandbox Contest. Innovation Sandbox Contest promotes new …

Monitoring user activity in proprietary business-critical apps
Fortscale Security announced at RSA Conference 2015 that it’s extending its User Behavior Analytics (UBA) solution to offer visibility into user activity in proprietary …

Protecting identities from the endpoint to the cloud
At RSA Conference 2015, RSA launched the RSA Via family of Smart Identity solutions, engineered to combine authentication, identity and access management, and identity …

2 out of 3 IT pros put systems at risk by making undocumented changes
The Netwrix 2015 State of IT Changes Survey of more than 700 IT professionals across 40 industries found that 70% of companies forget about documenting changes, up from 57% …

Security industry has failed, it’s time to chart new course
In front of computer security professionals attending RSA Conference 2015, Amit Yoran, president of RSA, The Security Division of EMC, challenged the industry to relinquish …

The look and feel of RSA Conference 2015
RSA Conference 2015 is underway in San Francisco, and infosec companies, experts and customers are crowding the expo floor. Here’s the first of several galleries …

Knowledge base of malware intelligence enables rapid containment
The Lastline Knowledge Base (LLKB) launched at the RSA Conference 2015. The new software module can be combined with the Lastline Breach Detection Platform to give security …

How attackers exploit end-users’ psychology
At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …

Continuous monitoring of perimeter and internal IT assets
At RSA Conference 2015, Qualys announced that its popular Qualys Continuous Monitoring (CM) solution for the perimeter now includes internal monitoring capabilities enabling …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption