Photos: RSA Conference 2010 Expo, part 3
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: nCircle, Websense, Symantec, ST Electronics, Barracuda Networks and the FBI.
Best cloud identity provider in the world: you
MultiFactor SecureAuth announced an integrated 2-factor authentication solution that enables an enterprise to become an instant identity provider (IdP) for cloud based …
US cybersecurity plans revealed
“In order to be successful against today’s cybersecurity threats, we must continue to seek out innovative new partnerships — not only within government, but also …
Proactive forensic toolkit for threat-based policies
Norman ASA announced its Forensic Toolkit, which enables organizations to investigate client activity and provides a management console that makes it easy to apply policies to …
Software crackers can actually hurt you
The economic crisis has dented your budget? You might have not done it before, but now you’re thinking about cracking legitimate software instead of paying the fee. …
Quarantine and taxation to stomp out malware?
Is the quarantine of infected computers and setting up an internet usage tax the way to go about defusing the malware threat? Scott Charney, Corporate Vice President for …
Massive Mariposa botnet shut down
Mariposa botnet has been shut down and three suspected criminals accused of operating it have been arrested by Spanish law enforcement. Mariposa stole account information for …
Tokenization that eliminates data collision
Protegrity announced a tokenization enhancement to the Protegrity Data Protection System (DPS) 5.2, the newest version of its data protection platform. Tokenization is the …
Secure borderless networks architecture
Cisco announced the Cisco Secure Borderless Network architecture, which evolves enterprise security by focusing on four critical anchors: enterprise endpoints (mobile or …
Photos: RSA Conference 2010 Expo, part 2
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: McAfee, NetOptics, EMC, Symantec and Qualys.
Millions lost due to illegal interception of cell phone calls
A survey released today by the Ponemon Institute on behalf of Cellcrypt, reveals that large and medium businesses are putting themselves at risk as a result of cell phone …
Wireless IDS for merchants and healthcare
Cybera announced SECURE|WAVE, its wireless intrusion detection service that identifies threats and vulnerabilities by analyzing wireless network traffic, and is designed for …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)