Read more about RSA
Bookmark and Share
  • Search for vulnerable servers unearths weak, thousands-times repeated RSA keys

    17.03.2015

    A group of researchers from the Information Security Group from Royal Holloway, University of London, wanted to see how many TLS servers still supported the weak, export-grade (512-bit) RSA public keys a week after the public disclosure of the FREAK flaw.

  • Nearly 50% have been a victim of a data breach

    04.11.2014

    RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.

  • Key focus areas for security technology investment

    13.05.2014

    A new report from the Security for Business Innovation Council advocates three key areas for technology investment and recommendations for specific security technologies to build better anticipatory defenses while also improving business productivity.

  • Additional NSA-backed code found in RSA crypto products

    01.04.2014

    A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous Dual_EC_DRBG cryptographic algorithm which is though to have been backdoored by the US NSA, and have discovered that the RSA BSAFE products contain another tool used by NSA that could make a Dual EC attack considerably faster and easier.

  • RSA's Coviello: Historic shift in IT use is changing society and culture

    25.02.2014

    In his opening keynote at RSA Conference 2014, Art Coviello, Executive VP of EMC Corporation and Executive Chairman of RSA, called for international government and industry cooperation on major issues including cyber war, surveillance, privacy and trust on the Internet.




Spotlight

The big picture of protecting and securing Big Data

Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. While this is a cutting edge use of technology, data monitoring can become dangerous when placed in the wrong hands.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Aug 28th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //