home.aspx
 
EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...

Allure Security

SHARESHARESHARE
DARPA-backed Allure Security is on a mission to detect and track data loss. Our patented beacon technology, embedded in decoy or real documents in operational folders, directories and cloud shares, create an alarm system with GPS for confidential data. When documents are opened, get proprietary geofence and telemetry insights to detect early breach activity, respond with countermeasures, and identify leakers and hackers.
SHARESHARESHARE

RELATED NEWS


A fresh variant of an Android virus that resembles the self-propagating email worms of the early 2000s has been discovered, which pretends to be a Google Plus app....
INFOSECURITY MAGAZINE
READ MORE

The next major network security threat could come from the sky, in the form of drones equipped with video cameras and the ability to sniff out mobile devices and their unique identifiers, perhaps even establishing rogue network access points in the sky that could be used to hack sensitive government or corporate networks....
DEFENSESYSTEMS
READ MORE

The cameras set up around your office or home could be making you vulnerable to being spied on by anyone around the world. A San Antonio cybersecurity expert Red Thomas says while most security systems have been improved there are always vulnerabilities in any closed security camera system. “Most webcams now come with secure protocols that kind of prevent that sort of thing from happening or they just don't respond to those sorts of a web crawl requests for more information,” Tho...
KSAT
READ MORE

The hackers used “forged ‘cookies’” – bits of code that stay in the user’s browser cache so that a website doesn’t require a login with every visit, wrote Yahoo’s chief information security officer, Bob Lord. The cookies “could allow an intruder to access users’ accounts without a password” by misidentifying anyone using them as the owner of an email account. The breach may be related to theft of Yahoo’s proprietary code, Lo...
THEGUARDIAN.COM
READ MORE

The age of the Internet has created a new worldwide threat: the information breach. Once thought to be a side effect of the holiday season, when credit card use is at its highest, today information hacks frequently strike year-round. In 2015 alone, credit card breaches were reported at major retailers, such as CVS, the UK's Carphone Warehouse and Trump Hotels. Healthcare providers, such as Excellus BlueCross BlueShield, UCLA Health, and Anthem also reported that client records, including per...
PR NEWSWIRE
READ MORE

A two-stage financial attack has been discovered that targets multiple ATMs around the world, including Latin America, Europe and Asia, allowing attackers to remove money via direct manipulation and steal millions of dollars....
INFOSECURITY MAGAZINE
READ MORE

EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...