RSA Conference 2017
Intel Security’s strategy for eliminating cybersecurity fragmentation
At RSA Conference 2017, Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation. The workforce shortage facing …
Qualys Cloud Platform offers two new disruptive services
Qualys announced a major expansion of its Qualys Cloud Platform. New services include File Integrity Monitoring (FIM) and Indicators of Compromise (IOC) detection solutions …
Researchers demonstrate ransomware for industrial control systems
We’ve witnessed ransomware targeting Windows and Linux systems and Macs, Android devices, smart TVs, and even a ransomware scheme targeting iPhone users (though not …
Targeted attack prevention in cloud email and messaging systems
GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native …
U.S. consumers’ views on cybersecurity
To better understand how Americans think about hacker motivations, consumer versus business security responsibilities, ransomware and the political climates impact on the …
Cybersecurity training management and skills assessment platform
No cost and open source cybersecurity massive open online course (MOOC) provider Cybrary announced the launch of its Teams training management and skills assessment platform …
Security programs not keeping up with IoT threats
More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …
Qualys and Bugcrowd bring automation, crowdsourcing to web app security
At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …
Cybereason unveils complete next-generation endpoint platform
Cybereason unveiled a new Endpoint Security Platform that includes next-generation antivirus (NGAV) functionality at RSA Conference 2017 in San Francisco. By integrating …
25% of web apps still vulnerable to eight of the OWASP Top Ten
69 percent of web applications are plagued by vulnerabilities that could lead to sensitive data exposure, and 55 percent by cross-site request forgery flaws, the results of a …
Top phishing targets in 2016? Google, Yahoo, and Apple
For every new phishing URL impersonating a financial institution, there were more than seven impersonating technology companies. Comparison of most impersonated companies …
InfoArmor VigilanteATI: Threat intelligence from the Dark Web
InfoArmor has expanded its global customer base in the enterprise and SME/SMB sector with its award-winning VigilanteATI Advanced Threat Intelligence Platform and …