
Attack types companies expect to encounter in 2017
What are the key attack types expected to cause the biggest security problems in 2017 and how successful will businesses be at defending against them? Tripwire and Dimensional …

Photos: RSA Conference 2017, Early Stage Expo
RSA Conference 2017 is underway at the Moscone Center in San Francisco. Here are a few photos from the Early Stage Expo, a space dedicated to and designed for young infosec …

Data-centric IoT security for Hadoop Big Data environments
Hewlett Packard Enterprise (HPE) introduced today at RSA Conference 2017 HPE SecureData for Hadoop and IoT, designed to easily secure sensitive information that is generated …

Remote credential rotation for distributed environments
At RSA Conference 2017, Bomgar introduced Bomgar Vault 17.1, the latest version of its enterprise password and credential management solution. Bomgar Vault helps organizations …

Logtrust debuts analytics solution for detecting threats in real-time
Logtrust announced at RSA Conference 2017 its Real-time Integrated Threat Analytics Solution Program. The program enables companies to build solutions that analyze the …

Photos: RSA Conference 2017 Expo, part 1
RSA Conference 2017 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: Qualys, ThreatQuotient, iovation, …

Researchers bypass ASLR protection with simple JavaScript code
A group of researchers from the Systems and Network Security Group at VU Amsterdam have discovered a way to bypass address space layout randomization (ASLR) protections of …

XAgentOSX Mac malware linked to Russian hacking group
Researchers have discovered and analyzed a new piece of Mac malware that is believed to be used by the Sofacy (aka Fancy Bear, aka Pawn Storm, aka APT28) hacking group. …

Trustwave introduces proactive threat hunting service
Trustwave announced at RSA Conference 2017 new and enhanced managed security and professional services designed to help short-circuit an attacker’s activities by detecting …

IBM adds Qualys technology to its Managed Security Services portfolio
Qualys announced at RSA Conference 2017 an expanded partnership with IBM that will add Qualys continuous cloud-based IT security and compliance technology to its Managed …

UnifyID’s ingenious user authentication platform wins Innovation Sandbox Contest
A panel of venture capitalists, entrepreneurs and large security companies selected UnifyID from a group of 10 finalists as the winner of the Innovation Sandbox Contest at RSA …

Companies struggle to deploy security for custom applications
As more and more companies migrate their application workloads from their datacenters to infrastructure-as-a-service (IaaS) platforms such as the Amazon Web Services (AWS) …