Photo from RSA

How to talk to the board about IT security

Talking to a board of directors is one of the things CISOs or their equivalents have to get used to,...

April 22nd, 2015 Howard Solomon

Company president Amit Yoran:  'We're in the dark ages.' RSA photo

Challenge vendors to prove security solutions work: RSA chief

Organizations have to pressure IT security pros and the security industry to prove their solutions are effective in the face...

April 21st, 2015 Howard Solomon

Feature Security Privacy 1

C-suite execs fear ‘domino effect’ of cyber attacks: Survey

High-ranking corporate executives are worried that in a networked economy, a cyber attack on one company could spill over to...

April 20th, 2015 Nestor E. Arellano

The US National Security Agency headquarters

Second NSA security tool found in RSA’s cryptography kit

Security provider RSA adopted a second code generator developed by the United States National Security Agency which effectively made it...

March 31st, 2014 Nestor E. Arellano

Security Encryption Graphic

Catching bugs: How Microsoft set up its bounty program

SAN FRANCISCO – When Katie Moussouris first tried to launch a program to pay security researchers for finding bugs in...

March 1st, 2014 Candice So

Security Encryption Graphic

RSA 2014 roundup: New products from Sophos, iBoss and viaForensics

The annual RSA Conference provides an opportunity for security vendors to steal some of the spotlight from the host and...

February 28th, 2014 Howard Solomon


RSA conference: How the cloud can improve security

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say...

February 28th, 2014 Candice So

Cloud Security,

RSA conference: 10 security concerns for the public cloud

SAN FRANCISCO - It’s not news that businesses are moving more  of their data to the cloud. But even as...

February 28th, 2014 Candice So

security feature

RSA conference: One shared threat database in security’s future

SAN FRANCISCO – With daily headlines about new malware, dangerous threats, and unforeseen attack vectors, it might be easy to...

February 27th, 2014 Candice So