
Photos: RSA Conference 2015, part 2
RSA Conference 2015 is underway in San Francisco. For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: Qualys, …

Waratek named Most Innovative Company
Waratek was named the “Most Innovative Company at RSA Conference 2015” as part of the 10th annual Innovation Sandbox Contest. Innovation Sandbox Contest promotes new …
Hacktivists are targeting law enforcement personnel, warns FBI
The FBI has issued an alert for law enforcement personnel and public officials, warning them that they may be targeted by hacktivists.“Hacking collectives are effective …

Monitoring user activity in proprietary business-critical apps
Fortscale Security announced at RSA Conference 2015 that it’s extending its User Behavior Analytics (UBA) solution to offer visibility into user activity in proprietary …

Protecting identities from the endpoint to the cloud
At RSA Conference 2015, RSA launched the RSA Via family of Smart Identity solutions, engineered to combine authentication, identity and access management, and identity …

2 out of 3 IT pros put systems at risk by making undocumented changes
The Netwrix 2015 State of IT Changes Survey of more than 700 IT professionals across 40 industries found that 70% of companies forget about documenting changes, up from 57% …
Popular WordPress plugins vulnerable to XSS
At least 17 WordPress plugins – and likely even more of them – have been found vulnerable to cross-site scripting (XSS) flaws that could allow attackers to inject …

Security industry has failed, it’s time to chart new course
In front of computer security professionals attending RSA Conference 2015, Amit Yoran, president of RSA, The Security Division of EMC, challenged the industry to relinquish …

The look and feel of RSA Conference 2015
RSA Conference 2015 is underway in San Francisco, and infosec companies, experts and customers are crowding the expo floor. Here’s the first of several galleries …

Knowledge base of malware intelligence enables rapid containment
The Lastline Knowledge Base (LLKB) launched at the RSA Conference 2015. The new software module can be combined with the Lastline Breach Detection Platform to give security …

How attackers exploit end-users’ psychology
At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …

Continuous monitoring of perimeter and internal IT assets
At RSA Conference 2015, Qualys announced that its popular Qualys Continuous Monitoring (CM) solution for the perimeter now includes internal monitoring capabilities enabling …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated