Read more about RSA
Bookmark and Share
  • Key focus areas for security technology investment

    13.05.2014

    A new report from the Security for Business Innovation Council advocates three key areas for technology investment and recommendations for specific security technologies to build better anticipatory defenses while also improving business productivity.

  • Additional NSA-backed code found in RSA crypto products

    01.04.2014

    A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous Dual_EC_DRBG cryptographic algorithm which is though to have been backdoored by the US NSA, and have discovered that the RSA BSAFE products contain another tool used by NSA that could make a Dual EC attack considerably faster and easier.

  • RSA's Coviello: Historic shift in IT use is changing society and culture

    25.02.2014

    In his opening keynote at RSA Conference 2014, Art Coviello, Executive VP of EMC Corporation and Executive Chairman of RSA, called for international government and industry cooperation on major issues including cyber war, surveillance, privacy and trust on the Internet.

  • Transforming security processes to manage cyber risks

    11.12.2013

    RSA, The Security Division of EMC, released the latest SBIC report, providing guidance for how organizations can enable new competitive advantages in their business by transforming outdated and inflexible processes that govern the use and protection of information assets.

  • RSA advises customers to stop using NSA-influenced encryption algorithm

    20.09.2013

    In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the intelligence agency, NIST has reopened the public comment period for the standard so that the public can analyze and comment on it again.




Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //