
Identity, data governance across all apps, systems, and devices
At RSA Conference 2015, Deep Identity announced their expansion into London, UK, and the release of version 5 of their Identity and Data Governance Suite. Key features of the …
One-in-four Americans victimized by information security breaches
One-in-four Americans (25 percent) fell victim to information security breaches in the past year, according to a new survey from the American Institute of CPAs (AICPA), which …

Making password databases impossible to steal
A new technology, called Blind Hashing, that prevents offline password attacks by making databases impossible to steal, has been introduced at RSA Conference 2015 by start-up …

ThreatStream wins the Cutting Edge award
ThreatStream announced at RSA Conference 2015 that Cyber Defense Magazine has named them winner of the Cutting Edge award in the Enterprise Security Solutions category. The …
Apple’s fix didn’t close Rootpipe backdoor
When TrueSec researcher Emil Kvarnhammar discovered a privilege escalation bug affecting OS X that could allow attackers to gain complete control of the target’s Mac …

IoT creates new set of risks, orgs embrace active defense
If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …

Secure dynamic perimeters in cloud and hybrid environments
Cryptzone unveiled its next-generation access control solution at the RSA Conference 2015. AppGate Secure Access is based on the Software Defined Perimeter (SDP) model, which …

Early-warning-as-a-service for extended enterprise networks
At RSA Conference 2015, Norse introduced the Norse Intelligence Service, a unique fusion of automated and human threat monitoring and analysis that offers “early warning …

New cloud security certification from (ISC)2 and CSA
Today, at the RSA Conference 2015, (ISC)2 and the CSA announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP represents the advanced skills …
Ethical connected car hacking service launched
A new security service developed to test the exposure of connected vehicles to cyber-attacks and help all market players develop security solutions has been launched by …
New fileless malware found in the wild
“Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up. The wait over: Phasebot malware, …

Use of encryption continues to rise
The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse