Read more about RSA
Bookmark and Share
  • Key focus areas for security technology investment


    A new report from the Security for Business Innovation Council advocates three key areas for technology investment and recommendations for specific security technologies to build better anticipatory defenses while also improving business productivity.

  • Additional NSA-backed code found in RSA crypto products


    A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous Dual_EC_DRBG cryptographic algorithm which is though to have been backdoored by the US NSA, and have discovered that the RSA BSAFE products contain another tool used by NSA that could make a Dual EC attack considerably faster and easier.

  • RSA's Coviello: Historic shift in IT use is changing society and culture


    In his opening keynote at RSA Conference 2014, Art Coviello, Executive VP of EMC Corporation and Executive Chairman of RSA, called for international government and industry cooperation on major issues including cyber war, surveillance, privacy and trust on the Internet.

  • Transforming security processes to manage cyber risks


    RSA, The Security Division of EMC, released the latest SBIC report, providing guidance for how organizations can enable new competitive advantages in their business by transforming outdated and inflexible processes that govern the use and protection of information assets.

  • RSA advises customers to stop using NSA-influenced encryption algorithm


    In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the intelligence agency, NIST has reopened the public comment period for the standard so that the public can analyze and comment on it again.


Using Hollywood to improve your security program

Posted on 29 July 2014.  |  Tripwire CTO Dwayne Melancon spends a lot of time on airplanes, and ends up watching a lot of movies. Some of his favorite movies are adventures, spy stuff, and cunning heist movies. A lot of these movies provide great lessons that we can apply to information security.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Wed, Jul 30th