Please turn on your JavaScript for this page to function normally.
Storm
Early-warning-as-a-service for extended enterprise networks

At RSA Conference 2015, Norse introduced the Norse Intelligence Service, a unique fusion of automated and human threat monitoring and analysis that offers “early warning …

RSA Conference 2015
New cloud security certification from (ISC)2 and CSA

Today, at the RSA Conference 2015, (ISC)2 and the CSA announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP represents the advanced skills …

Ethical connected car hacking service launched

A new security service developed to test the exposure of connected vehicles to cyber-attacks and help all market players develop security solutions has been launched by …

New fileless malware found in the wild

“Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up. The wait over: Phasebot malware, …

Use of encryption continues to rise

The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in …

Fox-IT launches cyberthreat management platform

Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …

Valve tries to curb Steam scam accounts with new rule

Gaming corporation Valve is trying to make spammers’ and phishers’ lives more difficult and, consequently, their own users’ gaming experience more pleasant …

Binary
Security guidance for early IoT adopters

The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …

Red door
Real-time traffic analysis and inventory of virtualized assets

Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …

Russian APT group actively exploiting Flash, Windows 0-day flaws

APT28, believed to consist of Russian hackers, has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an “international government entity …

shadow
Organizations continue to rely on outdated technologies

TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …

Advanced threat detection platform leveraging distributed computing

At the RSA Conference 2015, Damballa unveiled Damballa Failsafe 6.0. This advanced threat detection platform leverages a distributed computing architecture that enables the …

Don't miss

Cybersecurity news