LATEST NEWS

RSA 2015: Tension continues to grow between govt, cryptographers

Government demands for back doors cryptography are ratcheting up discord with cryptographers, according to RSA panelists.

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.

RSA 2015: Change - its a mindset, not a technology problem

The threat landscape has changed and we have to constantly challenge the existing thinking to get ahead of our adversaries RSA President Amit Yoran told delegates on Tuesday.

'Rootpipe' vulnerability still exploitable on patched machines

Apple "rootpipe" vulnerability was supposedly patched in the company's most recent release, but a security researcher says differently.

FEATURED: Cyber Security

Study: Open Source Software use increasing in enterprises but without vulnerability monitoring

As companies increasingly integrate Open Source Software (OSS) into their business IT environments, they appear to be faltering in monitoring the software for vulnerabilities and creating official policies and procedures.

Product Reviews

Cyphercor LoginTC

starstarstarstar½
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Entrust IdentityGuard

starstarstarstar½
Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.

PistolStar PortalGuard

starstarstarstarstar
PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.

OPINIONS

Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US