Please turn on your JavaScript for this page to function normally.
Phantom
Phantom: Security automation and orchestration platform

The Phantom platform can integrate existing security technologies and provide a layer of “connective tissue” between otherwise disparate systems. Phantom was …

Magnify
DB Networks partners with Cyphort and Security On-Demand

Big news from DB Networks, a provider of database cybersecurity products. They partnered with Cyphort to offer customers full spectrum visibility from the desktop and network …

Ping Identity
Ping Identity enhances its Federated Access Management technology

Ping Identity updated its Federated Access Management technology. Designed to displace legacy Identity and Access Management infrastructures, this latest release includes …

OptioLabs OptioInsight
Correlate real-time data from mobile devices across the enterprise

OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …

Niara dashboard
Utilize any data source to see attacks on the inside

Niara, a provider of security analytics for attack detection and incident response, announced that the latest release of its security analytics platform analyzes any data …

Siemplify
Siemplify brings military intelligence capabilities to enterprise security operations

Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode with the first security operations platform to employ the same cybersecurity …

VERA
Vera secures $17 million in series B financing

Vera, a top 10 finalist for the Innovation Sandbox competition at RSA Conference 2016, has closed $17 million in Series B financing, led by Sutter Hill Ventures, with …

healthcare
Hacking hospitals: Cyber attacks can result in physical harm

Independent Security Evaluators (ISE) published a study that demonstrates security flaws to be pervasive within the healthcare industry. The research found that adversaries …

illusive networks
Attacker View exposes hidden cyber attack paths

Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …

RSA Conference expo
Cyber Risk Board Forum to take place during RSA Conference 2016

RSA Conference has teamed up with NYSE Governance Services to host the Cyber Risk Board Forum. Set to take place February 29, 2016, in San Francisco, in conjunction with the …

RSA Conference
Cloud Security Alliance hackathon offers $10,000 prize

The Cloud Security Alliance (CSA) will hold its fourth hackathon at the RSA Conference 2016 in San Francisco, to continue to test the CSA Software Defined Perimeter (SDP) …

RSA Conference Innovation Sandbox
Innovation Sandbox Contest 2016 finalists announced

RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …

Don't miss

Cybersecurity news