corporate
72% of companies are not prepared for a data breach
EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of …
Rapid7 acquires NT OBJECTives, offers web app scanning
Rapid7 has acquired NT OBJECTives (NTO), expanding Rapid7’s Threat Exposure Management offering to further meet the needs of business infrastructures.NTO’s application …
Banking Trojan delivered to companies via macro-based malware
“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware. But instead …
Application manager that pleases both IT and the user
At RSA Conference 2015 AppSense announced the release of AppSense Application Manager version 8.9.Application Manager 8.9 leverages AppSense’s decade-plus experience balancing …
SecureDoc Cloud removes security concerns related to cloud file sharing
WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc …
Network discovery and visibility for massive enterprise networks
At RSA Conference 2015, Auconet unveiled its new Enterprise Security Foundation (ESF) that fortifies security for both partners and enterprises. ESF provides third-party …
The ticking cybersecurity risk: Managing wearable tech in the workplace
Smartphones and tablets took time to effectively crossover from consumer device to business staple. Wearables, despite still being the infants of IT hardware, are already …
Gemalto’s solutions challenge today’s security thinking
Gemalto demonstrates at RSA Conference 2015 how its SafeNet Identity and Data Protection solutions help enterprises challenge today’s security thinking with a new data …
Protecting identities from the endpoint to the cloud
At RSA Conference 2015, RSA launched the RSA Via family of Smart Identity solutions, engineered to combine authentication, identity and access management, and identity …
2 out of 3 IT pros put systems at risk by making undocumented changes
The Netwrix 2015 State of IT Changes Survey of more than 700 IT professionals across 40 industries found that 70% of companies forget about documenting changes, up from 57% …
How attackers exploit end-users’ psychology
At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …
Simplified VPN, web access for authorized users via push notification
Entrust Datacard announced at RSA Conference 2015 the introduction of a new push authentication capability in its Entrust IdentityGuard Mobile platform that allows authorized …