Please turn on your JavaScript for this page to function normally.
sidelines infosec professional
Cybersecurity still seen as a tech issue, not a business imperative

Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According …

vault safe
Secure passwords for privileged accounts with Bomgar Vault

At RSA Conference 2016 Bomgar announced the new Bomgar Vault, which helps companies secure, manage, and administer shared credentials for privileged users and IT vendors. …

Unmanaged wearables infiltrating the enterprise

Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …

Dell SecureWorks speeds up endpoint intrusion detection, response

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …

abstract
Critical gaps in IT departments’ approach to enterprise security

A new study by conducted by Ultimate Windows Security, released at RSA Conference, provides visibility into the uses, concerns and challenges that IT departments face in …

TITUS Illuminate
Discover, classify, protect and analyze data with TITUS Illuminate

According to a recent Forrester report, data discovery and classification is an often-overlooked yet critical component of data security and control. Today, at RSA Conference …

application
The everyday application interactions putting enterprises at risk

With greater awareness about the risks of unsecured privileged accounts allowing broad, anonymous access across the enterprise, privileged account security has become an …

Rook Security War Room app
War Room app for enterprise incident response and collaboration

Today at RSA Conference, Rook Security introduced War Room, an enterprise app that provides real-time unified incident and crisis management collaboration in the cloud. …

professional
Why the C-suite should care about cybersecurity

Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …

mobile devices
Review: Mobile Data Loss

Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …

phone
VoIP phones can be turned into spying or money-making tools

A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …

Hadoop
Is Hadoop secure enough for the enterprise?

An ever-increasing number of organisations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or …

Don't miss

Cybersecurity news