
Centrify launches cloud-based privileged identity service
At RSA Conference 2015 Centrify Corporation announced the launch of Centrify Privilege Service (CPS), a cloud-based identity management solution that addresses today’s growing …
70 bad exit nodes used in attack against Tor-based SIGAINT
Darknet email service SIGAINT, which aims to provide email privacy to journalists, has been targeted by unknown attackers using at least 70 bad exit nodes, the service’s …

Automate root cause prevention of network compromise
FireMon announced at RSA Conference 2015 significant advancement of its core platform through the introduction of Security Manager 8.0, which leverages highly automated …

Barracuda makes its NG Firewall manageable via iOS app
At RSA Conference 2015, Barracuda has released the latest version in its NG Firewall product line, which includes a number of new features and updates designed to simplify …
100,000 web shops open to compromise as attackers exploit Magento bug
A critical vulnerability found in Magento, the most popular content management system for e-commerce sites, is being exploited by hackers to get their hands on users’ …
DDoS threat recognized by all members of the C-suite
The increasing number and size of DDoS attacks and their costly and devastating effects on brand perception have not passed unnoticed by North American businesses, most of …
CyberCenturion contest seeks out UK’s young cyber security talent
Northrop Grumman Corporation has renewed its commitment to run the successful CyberCenturion competition for a second year in 2016, continuing its efforts to seek out the …

High-profile data breaches made most CEOs re-examine security programs
There has been increased board- and C-level interest in information security programs in light of recent high-profile data breaches such as those affecting Sony, Anthem and JP …
Latest trends in the ransomware business
“Cybercrooks wielding ransomware might prefer getting paid in Bitcoin, but the crypto currency is just a way to obfuscate the real destination of the payment – as …

Photos: RSA Conference 2015, part 5
For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: Bleuliv, Entrust Datacard, Palo Alto Networks, Bitglass, Duo …

IBM brings cyber threat analytics to the cloud
IBM announced at RSA Conference 2015 it is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability quickly prioritize real …

Cyphort combines APT detection with lateral movement
At RSA Conference 2015, Cyphort announced the availability of Cyphort Advanced Threat Defense Platform 3.3, which includes malware lateral movement detection, the ability to …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)