![Qualys Cloud Agent](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194703/qualys-cloud-agent-400x200.jpg)
Cloud agent platform for continuous IT asset inventory, security and compliance
At RSA Conference 2015, Qualys announced the launch of Qualys Cloud Agent Platform (CAP), which extends Qualys’ Cloud Security and Compliance Platform with lightweight agents …
![Apple Watch](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194705/apple_watch-400x200.jpg)
Apple Watch app for managing threat intelligence on-the-go
ThreatStream today announced at RSA Conference 2015 the first iOS threat intelligence app for the Apple Watch. The app, which is also available for the iPhone and iPad, …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194817/email-1-400x200.jpg)
Automated protection of enterprise email, docs and data
At RSA Conference 2015 TITUS launched TITUS Classification Suite 4, a significant new release of its flagship data identification and information protection suite. Already in …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195728/laptop-eyes-technology-computer-400x200.jpg)
Raytheon delivers end-to-end visibility to address cyber threats
At the RSA Conference 2015 today, Raytheon announced a new suite of solutions that can change the way companies address cybersecurity by helping enterprises operate in the …
1,500 iOS apps sport flaw that allows interception of sensitive user data
A bug in an older version of AFNetworking, an open source library widely used for adding networking capabilities to iOS and OS X apps, can allow attackers to intercept and …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195211/business-400x200.jpg)
Identity, data governance across all apps, systems, and devices
At RSA Conference 2015, Deep Identity announced their expansion into London, UK, and the release of version 5 of their Identity and Data Governance Suite. Key features of the …
One-in-four Americans victimized by information security breaches
One-in-four Americans (25 percent) fell victim to information security breaches in the past year, according to a new survey from the American Institute of CPAs (AICPA), which …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Making password databases impossible to steal
A new technology, called Blind Hashing, that prevents offline password attacks by making databases impossible to steal, has been introduced at RSA Conference 2015 by start-up …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194708/light-400x200.jpg)
ThreatStream wins the Cutting Edge award
ThreatStream announced at RSA Conference 2015 that Cyber Defense Magazine has named them winner of the Cutting Edge award in the Enterprise Security Solutions category. The …
Apple’s fix didn’t close Rootpipe backdoor
When TrueSec researcher Emil Kvarnhammar discovered a privilege escalation bug affecting OS X that could allow attackers to gain complete control of the target’s Mac …
![London](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195027/london-400x200.jpg)
IoT creates new set of risks, orgs embrace active defense
If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194928/labyrinth-400x200.jpg)
Secure dynamic perimeters in cloud and hybrid environments
Cryptzone unveiled its next-generation access control solution at the RSA Conference 2015. AppGate Secure Access is based on the Software Defined Perimeter (SDP) model, which …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days