InfoSec World 2008: Expo photos #1
Here’s a collection of photos from the show floor where the InfoSec World Conference & Expo 2008 is taking place.
InfoSec World 2008: Photos of the venue
Here’s a collection of photos of the Orlando venue where the InfoSec World Conference & Expo 2008 is taking place.
Open source code for driving security into web services
OpenLiberty, the global open source community working to provide developers with resources and support for building interoperable, secure and privacy-respecting identity …
Breach Security upgrades web application security solution
WebDefend, now in version 3.2, identifies and stops abuse of web application resources, offers higher performance, and delivers enhancements to ease enterprise-wide adoption. …
SSH Communications Security releases SSH Tectia 6.0
SSH Communications Security Corp. released SSH Tectia Client 6.0, SSH Tectia Server 6.0, SSH Tectia Manager 6.0, and the new, innovative SSH Tectia ConnectSecure 6.0. …
NSA certifies the Sectera Edge smartphone
The National Security Agency (NSA) has certified the wireless Sectera Edge smartphone, a product of General Dynamics C4 Systems, for voice communications classified up to the …
Brothers sentenced for selling $6+ million in pirated software
Two brothers were sentenced today in federal court to 30 months and three years in prison for selling massive amounts of pirated computer software. After receiving complaints …
Top 10 malware of the week
According to data gathered at the Infected or Not website the NaviPromo adware has been the most active malicious code this week. Adware occupies nine spots in the top ten …
WatchGuard unifies security and mobility
WatchGuard unveiled new remote access solutions designed to give remote and mobile workers highly secure connectivity to their corporate network. For enterprise organizations …
Enhanced protection for Exchange and SQL servers in a virtual environment
Companies are increasingly using virtualization for a variety of different productivity and cost saving reasons. Virtualization is being increasingly used by IT departments …
Details on the new anti card fraud mobile phone technology
A new Israeli technology brought to the U.S. by Secure Identity Systems (SIS) thwarts credit and debit card fraud, and potentially stops ID thieves in the act. This in turn …
Annual state of IBM System i (AS/400) security study
The PowerTech Group, Inc. today released its fifth annual review of the state of security on IBM’s System i platform (also known as AS/400 or iSeries). This year’s …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways