LATEST NEWS

RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community

The counterterrorism, security and aviation communities must contemplate how unintended use of aircraft systems or networks could have a downstream impact.

Microsoft expands bug bounty program to include Project Spartan

Microsoft announced plans on Wednesday to on expand its bug bounty program to include Project Spartan, the company's new browser, and Azure, the company's cloud platform.

RSA 2015: Some point-of-sale security tips

Using point-to-point encryption and monitoring privileged credentials are among the point-of-sale security tips offered during a session at RSA Conference 2015

RSA 2015: Experts talk investor interest in cybersecurity, regulatory changes on horizon

An SEC commissioner's chief of staff and shareholder advocacy expert discussed complex disclosure expectations among investors.

FEATURED: Cyber Security

Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK

F-Secure Labs released a threat report for the last half of 2014 and found that North America wasn't receiving the brunt of Conficker attacks, as opposed to other parts of the world.

SC Awards 2015 Winners

Congratulations to the winners of this year's SC Awards. Winners received acknowledgement and placques at the annual SC Awards gala held in San Francisco on Tuesday. For the winners and finalists of the SC Awards 2015, take a look at our Book of the Night.




Product Reviews

RSA Authentication Manager

starstarstarstarstar
The RSA Authentication Manager is a dual-factor authentication system designed from the ground up for enterprise deployment.

SecureAuth IdP

starstarstarstarstar
SecureAuth IdP is an identity provider – with a unique approach to securing user access control.

Swivel Secure Swivel Appliance

starstarstarstarstar
The Swivel Appliance is a competitive solution for two-factor authentication methods for clients searching for a secure product.

OPINIONS

Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US