![phantom](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113907/phantom-featured-400x200.jpg)
Phantom named RSA Conference 2016’s Most Innovative Startup
RSA Conference has named Phantom “RSAC Most Innovative Startup 2016″ in its Innovation Sandbox Contest. A panel of venture capitalists, entrepreneurs and large security …
![Terbium Labs](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113909/terbium_labs-400x200.jpg)
Terbium Labs closes $6.4m in funding for stolen data discovery on Dark Web
Terbium Labs announced at RSA Conference that it has raised $6.4 million in Series A financing led by .406 Ventures, bringing the total raised to $9.7 million. Terbium Labs …
![qualys cloud agent platform](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113911/qualys-cloud-agent-platform-400x200.jpg)
Qualys extends Cloud Agent Platform to support Linux and Mac OS
Qualys announced the expansion of the Qualys Cloud Agent Platform. The Cloud Agent platform empowers organizations with flexibility and real-time asset inventory searches on a …
![break](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113914/break-400x200.jpg)
DROWN attack breaks TLS encryption, one-third of all HTTPS servers vulnerable
There’s a new attack that breaks the communication encryption provided by SSL and TLS and can therefore lead to theft of extremely sensitive data exchanged between users …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113919/abstract3-400x200.jpg)
Critical gaps in IT departments’ approach to enterprise security
A new study by conducted by Ultimate Windows Security, released at RSA Conference, provides visibility into the uses, concerns and challenges that IT departments face in …
![TITUS Illuminate](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113922/TITUS_Illuminate-400x200.jpg)
Discover, classify, protect and analyze data with TITUS Illuminate
According to a recent Forrester report, data discovery and classification is an often-overlooked yet critical component of data security and control. Today, at RSA Conference …
![resurrection](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113925/hackingteam-400x200.jpg)
Is Hacking Team still using the same old, slightly modified malware?
A newly analyzed OS X malware sample shows that Hacking Team is likely still using old code for its newest spying tools. An alternative (but less likely) theory is that …
![cloud threats](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113927/cloud-threats-400x200.jpg)
Top 12 cloud computing threats in 2016
The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …
![Gmail](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194442/gmail-400x200.jpg)
Google bolsters Gmail data loss prevention
A few months ago, Google provided a data loss prevention (DLP) solution for Gmail to Google Apps Unlimited Customers. The solution allows administrators to set up scanning of …
![leak](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113929/leak-400x200.jpg)
Snapchat falls for BEC scam, leaks employee payroll info
A successful email phishing attack aimed at Snaptchat’s payroll department has resulted in the compromise of payroll information about some current and former employees, …
![tax](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113939/tax-400x200.jpg)
Security audit identified risky e-filing tax services
The Online Trust Alliance (OTA) evaluated the privacy, security and consumer protection practices of the thirteen IRS-approved free e-filing tax services. After an assessment …
![sap](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113936/sap-400x200.jpg)
Senior level perceptions about SAP security
More than half of companies believe it is likely their company would have a data breach due to insecure SAP applications, according to a new Ponemon Institute study. This same …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark