RSA 2015: Tension continues to grow between govt, cryptographers

Government demands for back doors cryptography are ratcheting up discord with cryptographers, according to RSA panelists.

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.

RSA 2015: Change - its a mindset, not a technology problem

The threat landscape has changed and we have to constantly challenge the existing thinking to get ahead of our adversaries RSA President Amit Yoran told delegates on Tuesday.

'Rootpipe' vulnerability still exploitable on patched machines

Apple "rootpipe" vulnerability was supposedly patched in the company's most recent release, but a security researcher says differently.

FEATURED: Cyber Security

Study: Open Source Software use increasing in enterprises but without vulnerability monitoring

As companies increasingly integrate Open Source Software (OSS) into their business IT environments, they appear to be faltering in monitoring the software for vulnerabilities and creating official policies and procedures.

Product Reviews

Cyphercor LoginTC

LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Entrust IdentityGuard

Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.

PistolStar PortalGuard

PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.


Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters