Please turn on your JavaScript for this page to function normally.
idea
Cybersecurity today: Turning positive with new thinking and innovation

In this podcast recorded at RSA Conference 2017, Melanie Ensign, Co-Chair for WISP and Head of Security & Privacy Communications at Uber, and Ajay Arora, CEO and founder …

Vera
Friction matters: Data security lessons from Snapchat and Google

In this podcast recorded at RSA Conference 2017, Grant Shirk and Veliz Perez, Head of Product Marketing and Product Marketing Manager at Vera respectively, talk about how the …

early stage expo rsac 2017
Photos: RSA Conference 2017, Early Stage Expo

RSA Conference 2017 is underway at the Moscone Center in San Francisco. Here are a few photos from the Early Stage Expo, a space dedicated to and designed for young infosec …

Vera for Mail
Vera for Mail protects the confidentiality of email messages and attachments

Vera for Mail is an enterprise-grade security solution that lets businesses secure, track, and revoke access to any email they send. Built on Vera’s data-centric security …

keyboard
New infosec products of the week​: December 16, 2016

Ixia enhances network assessment and monitoring platform Ixia’s Hawkeye, which proactively generates and analyzes synthetic network and application traffic to assess how …

Windows 7
65% of Windows devices still running Windows 7, released in 2009

To analyze the current state of device security, Duo Security analyzed more than two million devices, 63 percent of which were running Microsoft operating systems. Seriously …

lock
Why attaching security to each piece of data is critical

Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My question to you: Are we really …

doors
How to choose a perfect data control solution for your enterprise

Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it. In …

code
Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …

VERA
Secure any kind of data, wherever it goes

We’ve all experienced that moment when you realize that you’ve shared the wrong file with the wrong person, potentially even at the wrong time. You’ve lost …

VERA
Add IRM, data security and encryption to any app

Vera launched its new IRM-as-a-Service (IRMaaS) product, allowing developers to use Vera’s data security platform to build encryption, tracking, policy enforcement, and …

Innovation Sandbox and the modern threat landscape

In this podcast, recorded at RSA Conference 2016, Ajay Arora, CEO at Vera, and Amir Ben-Efraim, CEO at Menlo Security, discuss their participation in the Innovation Sandbox …

Don't miss

Cybersecurity news