Non-profit org aims to solve Internet’s security issues

Non-profit org aims to solve Internet’s security issues


Non-profit org aims to solve Internet’s security issues

Posted: 29 Feb 2012 03:42 PM PST

Just thirty years from its initial appearance on the world's computing stage, the Internet is now so embedded in business and society that life without it is almost unthinkable. Yet there are key aspe...

A walk through the expo at RSA Conference 2012, part two

Posted: 29 Feb 2012 10:46 AM PST

The expo floor at this year's RSA Conference is bigger than ever, with numerous companies exhibiting for the first time. Here's another look at the show floor, with more interesting booths. For up-...

Employees are deliberately disabling security controls

Posted: 29 Feb 2012 09:36 AM PST

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study sponsored by Websense. S...

EMC unveils five new security advisory services

Posted: 29 Feb 2012 09:11 AM PST

Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, and manage information. The...

Cloud-based security with embedded wireless access

Posted: 29 Feb 2012 08:29 AM PST

Cybera announced the Cybera ONE Platform now delivers its full suite of cloud-based security services, as well as remote backup and recovery, over high-speed wireless 3G and 4G connections. Cybe...

RSA Conference 2012 award winners

Posted: 29 Feb 2012 07:24 AM PST

RSA Conference announced the honorees of its 15th annual awards program. Award applicants were judged in the fields of mathematics, public policy and security practices. Also presented this year w...

New "HTTPS Everywhere" for Firefox and a beta for Chrome

Posted: 29 Feb 2012 06:44 AM PST

The Electronic Frontier Foundation (EFF) launched the 2.0 version of HTTPS Everywhere for the Firefox browser today, including an important new update that warns users about web security holes. The...

ManTech acquires HBGary

Posted: 29 Feb 2012 06:23 AM PST

ManTech International, a provider of technologies and solutions for the US intelligence and defense community and various other federal government agencies, has announced that it has bought HBGary. ...

Surveying policies, controls and compliance

Posted: 29 Feb 2012 04:40 AM PST

Qualys unveiled a new service for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance to help businesses further automate their compliance tasks and reduce ...

"Free iPad 3" scams popping up

Posted: 29 Feb 2012 04:06 AM PST

As Apple announced an event taking place on March 7 and speculations of it being the formal presentation of the new version of the iPad flooded the Internet, scammers have decided to take advantage of...

25 alleged Anons arrested

Posted: 29 Feb 2012 03:37 AM PST

25 individuals suspected to be Anonymous members have been arrested during a coordinated international operation supported by Interpol across four countries in Europe and Latin America. "Operatio...

Software app kits for accelerating security apps

Posted: 29 Feb 2012 03:04 AM PST

Netronome announced a major upgrade to its Network Flow Management (NFM) software framework including new application kits for next-generation firewalls (NGFW), IPsec, intrusion prevention systems (IP...

Most executives don't pay attention to cyber risks

Posted: 29 Feb 2012 01:53 AM PST

The advanced findings from the latest 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing cyber risks reveals the issue is still not getting adequate atte...

Cloud-based targeted attack prevention

Posted: 29 Feb 2012 01:40 AM PST

M86 Security announced its strategy to deploy its core malware and threat research capabilities for Web and email into the cloud, beginning with the launch of the company's new cloud-based Targeted At...

Full-disk encryption with wireless pre-boot authentication

Posted: 29 Feb 2012 01:24 AM PST

WinMagic launched SecureDoc Version 5.3, which adds wireless capabilities to its PBConnex pre-boot network authentication. SecureDoc v5.3 will also introduce two other key features to simplify dat...

Malware extraction and analysis by Solera

Posted: 29 Feb 2012 01:11 AM PST

Solera Networks announced the latest enhancement to its DeepSee platform - the Real-Time File Extractor, which enables immediate, automatic identification and alerting of advanced and zero-day threats...

A walk through the expo at RSA Conference 2012

Posted: 28 Feb 2012 03:29 PM PST

The much anticipated expo at RSA Conference 2012 today opened its doors in great style. Here's the first of several galleries we'll have from the show. For up-to-date conference news check out our ...

Oz deal site admits e-book piracy snafu

Oz deal site admits e-book piracy snafu


Oz deal site admits e-book piracy snafu

Posted: 29 Feb 2012 03:15 PM PST

Cudo loses kudos

Dominant Australian group buying player Cudo has issued a mea culpa for its ill-fated decision to promote a Chinese e-book reader pre-loaded with 4000 pirated books.…

Antimatter asymmetry: new results bring solution closer

Posted: 29 Feb 2012 03:00 PM PST

Fermilab physicists' fingers crossed

Physicists are inching closer to explaining why we – and anything else made of matter – exist, with new results inching closer to an explanation of the universe's matter-antimatter asymmetry.…

Dotcom bail survives appeal, extradition hearing in August

Posted: 29 Feb 2012 02:08 PM PST

Megaupload kingpin seeks $NZ220 per month expenses

Accused Megaupload copyright conspiracy leader Kim Dotcom (formerly Schmitz) has been released on bail following hearings yesterday in which the FBI tried to keep him behind bars.…

Aussie soldiers let rip on Facebook

Posted: 29 Feb 2012 01:45 PM PST

Women, Muslims the fave targets

Australia's armed forces still appear addicted to offensive social media activities, a new investigation has found.…

IBM peddles used servers, PCs in China

Posted: 29 Feb 2012 01:20 PM PST

A market economy matures

As the Ferengi rules of acquisition point out, anything worth selling once is worth selling at least twice and maybe three times. And thus, Big Blue is opening up a server and PC refurbishing center in Shenzhen, the first such facility in China and one aimed at the burgeoning second-hand equipment market in that country.…

'Kill yourself now' - Torvalds throws openSUSE security tantrum

Posted: 29 Feb 2012 11:30 AM PST

Root password protocol 'mentally diseased'

Linux creator Linus Torvalds has issued a rare public spanking for openSUSE after falling foul of its security procedures.…

Millions of China's tweeters 'silenced by real names decree'

Posted: 29 Feb 2012 11:04 AM PST

State's new web rule will hit popular Sina Weibo

Chinese micro-blogging phenomenon Sina Weibo has warned that new government rules mandating the use of real names on social networks could silence at least 40 per cent of the site's punters.…

Thai floods float Seagate to top of hard drive biz

Posted: 29 Feb 2012 10:54 AM PST

Western Digital submerged, gurgling

Last year's severe flooding in Thailand may have been human and economic disaster, but if every cloud has a silver lining, that silver has slipped into the pockets of Seagate as it retook the top sales spot among hard drive businesses, unseating Western Digital.…

India splurges £10m on new mega internet snooping HQ

Posted: 29 Feb 2012 10:29 AM PST

All tweets, emails and status updates are belong to them

India's clampdown on its netizens is set to continue after its government revealed it is setting up a National Cyber Co-ordination Centre to monitor all web traffic flowing through the country - in the name of national security.…

Inside Eric Schmidt's brain: Holodecks, robo-cars and jail bandwidth

Posted: 29 Feb 2012 10:06 AM PST

Censorship, regulation also on Google kingpin's mind

MWC 2012  Telephony standards supremos at the GSMA love the phrase "connecting the unconnected" – the notion of getting data and voice links out to the masses.…

VMware mashes up Hadoop with Spring

Posted: 29 Feb 2012 09:55 AM PST

Corralling that big data elephant inside a framework

VMware has taken its Spring Java application framework and integrated it with the open source Apache Hadoop distribution to create a mashup that it's calling – somewhat unimaginatively – Spring Hadoop.…

Microsoft drops 'risky' Windows 8 preview on World

Posted: 29 Feb 2012 09:44 AM PST

Metro-lovers to rub themselves into 'fast, fluid' frenzy?

Microsoft has released to the World near-final code for Windows 8 - its riskiest bet yet.…

Powerful, wallet-sized Raspberry Pi computer sells out in SECONDS

Posted: 29 Feb 2012 09:28 AM PST

Tiny Brit wonder hardly even touched the shelves

The first batch of 10,000 ARM-powered Raspberry Pi computers went on sale at 6am GMT today - and sold out within minutes.…

Riot police encircle Mobile World Congress

Posted: 29 Feb 2012 08:57 AM PST

The natives are getting restless

MWC 2012  Student protesters are gathering outside the Mobile World Congress in Barcelona, chanting and shouting, which would be more concerning if they weren't more or less outnumbered by the riot police.…

G-Cloud guru slaps down Cloud Store critics

Posted: 29 Feb 2012 08:46 AM PST

You gotta have (NSIT) standards...

G-Cloud governor Chris Chant has defended the standards adopted to construct the Cloud Store framework and the length of contracts on offer.…

Irish ISPs urged to fit child porn filters

Posted: 29 Feb 2012 08:44 AM PST

Net biz accused of caring about copyright more than kids

Irish senators have put forward a motion in the Seanad (Senate) urging the justice minister to force ISPs to block child abuse material online.…

Ellison's Oracle cloud lives as hype winds down

Posted: 29 Feb 2012 08:21 AM PST

A slow conversion better than no conversion

Oracle Cloud Conference  For better or worse, Oracle has taken a conservative stance on "the cloud".…

iPhone photo-slurping loophole sparks app privacy fears

Posted: 29 Feb 2012 07:58 AM PST

Contact lists, pics, vids ... what else can devs grab?

Exactly how much data can be extracted from iPhones by apps without explicit user consent has been called into question after it emerged that software granted access to location-finding services can siphon off punters' photos.…

Wireless operators to become less, er, wireless

Posted: 29 Feb 2012 07:39 AM PST

You just can't beat copper

MWC 2012  Everyone is making small base stations this year, some will even drop into the palm of a hand, but that's good as operators are desperate to get their wireless services safely ensconced in copper as quickly as possible.…

Hacking scandal: James Murdoch quits UK newspaper biz

Posted: 29 Feb 2012 07:28 AM PST

NYC-based son of Rupert flees News International

James Murdoch has quit as executive chairman at News International.…

Stop snubbing top scientists' advice, Lords tell MPs

Posted: 29 Feb 2012 07:21 AM PST

Dossier of gov's dodgy decisions reveals sidelined advisers

The government must tap up its top boffins sooner and heed their advice before putting policies into action, a House of Lords committee report concludes.…

Qualcomm poised to zap wireless charging rival into dust

Posted: 29 Feb 2012 07:02 AM PST

WiPower and Qi in battle for the batteries

MWC 2012  Qualcomm is on the verge of licensing its wireless charging tech WiPower to a big-name brand, which could be enough to unplug rival standard Qi.…

iPad 3 launch news pushes Apple shares to $500bn high

Posted: 29 Feb 2012 06:43 AM PST

Cook likely to shake out $7bn to the shareholders

Following an email announcing the iPad 3 launch, Apple's share value hit an unprecedented $500bn in pre-marketing trading this morning, making the company worth more than Poland and many other things.…

Yahoo! scared! of! dot! brand! squatters!

Posted: 29 Feb 2012 06:17 AM PST

But nobody else is

Yahoo is worried about unscrupulous domain name registrars trying to cybersquat on its brands.…

CBOSS puts out operator bait: Dinner date with 'booth babe'

Posted: 29 Feb 2012 06:03 AM PST

Fancy a bit of deep packet inspection, guv?

MWC 2012  The quest for attention has ratcheted up a notch at this year's MWC, with CBOSS putting "booth babes" – the attractive staff at its MWC stall – on the table as dinner companions in the hope that someone will ask just what the company does.…

US gov IT services vendor swallows HBGary

Posted: 29 Feb 2012 05:48 AM PST

ManTech wants to penetrate deeper into cyber-security market

US government IT services firm ManTech International has bought HBGary, the network forensics and malware analysis firm best known for last year's hack by Anonymous against its now-defunct sister firm, HBGary Federal.…

Google tramples over Euro data protection law – French watchdog

Posted: 29 Feb 2012 05:27 AM PST

37 US attorneys general also 'troubled' by personal info being 'held hostage'

Google is hours away from changing its terms of service for its users, just as French data protection authority CNIL once again urged Larry Page's company to postpone its planned cut-and-shut tweak to its privacy policies.…

Keeping Score in the Public Sector

Posted: 29 Feb 2012 05:10 AM PST

Managing data effectively in the modern world

Live event  Stuck between a rock and a hard place? That's what public sector organisations feel like when it comes to managing data according to our latest Register Reader research. It's not getting any easier - our latest Reg Reader research looks at why? The findings of this study will lead the live discussion on March 13th 11:00 GMT; Anchor-man Jon Collins will be the host to a panel of Business Intelligence sympathisers to find out the 'How to' overcome information management related challenges over and above those experienced in the private sector.…

GPS glitch leads perp-pursuing cops to wrong house

Posted: 29 Feb 2012 05:07 AM PST

Stolen iPhone elsewhere

A man has been left with a £500 bill for a new front door after "tracking software" used to trace a stolen iPhone led Police to the wrong house.…

Tory minister: Let's exploit our rich resource of mud, er, wind

Posted: 29 Feb 2012 05:01 AM PST

Energy MP's hot air is no good for economy nor environment

Britain would be "mad" not to make strategic use of its rich natural resource of mud, a government minister has said.…

IBM layoffs now top 1,200

Posted: 29 Feb 2012 04:48 AM PST

Most of the cuts in the US and Canada

IBM has laid off over 1,200 employees in the last few days, according to a union organising group for the company's staff.…

Hands on with the Sony Xperia S, P and U

Posted: 29 Feb 2012 04:39 AM PST

The NXT generation

Microsoft demos 3D desktop with transparent OLED

Posted: 29 Feb 2012 04:26 AM PST

Reach 'round and move me

Microsoft's Applied Sciences Group has combined a transparent OLED display with an Xbox Kinect sensor and a smidgeon of software sorcery to create a space where users can manipulate on-screen objects at different depths within the screen.…

UK Broadband flicks switch on Blighty's first 4G network

Posted: 29 Feb 2012 04:14 AM PST

But this is not the 4G you were hoping for

MWC 2012  UK Broadband, wireless internet service provider to Swindon Council and beyond, has switched on its LTE network to claim the UK first, but don't expect to be making 4G phone calls any time soon.…

Tomorrow's smartphone tech today

Posted: 29 Feb 2012 04:00 AM PST

Look what's coming to mobiles in 2012

Toshiba swaps flood-soaked Thai plant for WD disk biz

Posted: 29 Feb 2012 03:48 AM PST

Will that make the European Commission happy?

It's as if we were tipped off: Toshiba is buying the 3.5-inch disk drive operations that WD has to sell to gain EU approval for its Hitachi GST acquisition.…

HP culls nearly half remaining webOS team

Posted: 29 Feb 2012 03:31 AM PST

275 engineers not required in move to open source

Hewlett-Packard continues to dismantle its webOS engineering team by handing nearly half of the remaining 600 techies their pink slips.…

Ancient Iceman murder victim was lactose-intolerant, sickly

Posted: 29 Feb 2012 03:16 AM PST

5,000-year-old corpse shows Oetzi might have pegged soon anyway

Scientists sequencing the genome of the 5,000-year-old "Iceman" corpse found 20 years ago in the Tyrolean Alps, have discovered that he had brown eyes, was lactose-intolerant, prone to heart disease and had Lyme disease. The boffins also found that he may be related to some modern-day Northern Mediterraneans.…

RIM PlayBook price cut specials become standard

Posted: 29 Feb 2012 03:06 AM PST

New low price... for now?

How big telcos can repel the Valley's OTT insurgents

Posted: 29 Feb 2012 03:00 AM PST

And why they probably shouldn't try

Part 2  After years of bouncing around PowerPoint slides, the battle between telcos and "Over The Top" insurgents is now very real. It's a scrap that's characterised as Silicon Valley upstarts storming the gates of the closed network world, and that's not a bad nutshell introduction. Long-time OTT champ Dean Bubley of Disruptive Analysis calls these insurgents "access-independent internet services".…

Court wonk tweets Apple's IPAD appeal showdown with Proview

Posted: 29 Feb 2012 02:47 AM PST

See Apple's hearing in blow-by-blow detail

In an unprecedented display of openness, a Guangdong court will embrace the social networking craze by allowing one of its officials to "live blog" today's appeal hearing during which Apple hopes to secure the right to use the iPad trademark in China.…

Microsoft's Azure cloud down and out for 8 hours

Posted: 29 Feb 2012 02:26 AM PST

'Cert issue' crashes Windows cloudy platform's service management

Updated  Microsoft's cloudy platform, Windows Azure, is experiencing a major outage: at the time of writing, its service management system had been down for about seven hours worldwide.…

Sony shifts more than a million PS Vitas

Posted: 29 Feb 2012 02:23 AM PST

Can it maintain the pace?

Trusted computing: It's BACK, and already in a pocket near you

Posted: 29 Feb 2012 02:12 AM PST

That bulge could be SOMEONE ELSE's tool

MWC  Trusted Computing, the widely-derided idea of computing secured for, and against, its users, is back and the necessary hardware is already in the majority of pockets.…

France: All your books are belong to us

Posted: 29 Feb 2012 02:01 AM PST

Pirate Party, Free Software bods, authors in IP land-grab fight

If the phrase "digital pirate" conjures up a lone socially challenged male with a large collection of Manga comics and Cory Doctorow ravings, think again. Some of the biggest "pirates" in the world are nation states.…

Apple assesses 14in Air for Asia

Posted: 29 Feb 2012 01:52 AM PST

Mid-size MacBook mooted

Amid all the iPad 3 hoopla comes some Mac news: Apple is said to be "considering" the introduction of a 14in MacBook Air.…

From server to end user: What's coming up for NFS?

Posted: 29 Feb 2012 01:28 AM PST

Big changes: Hole-punching and application data blocks

Deep Dive  NFS (Network File System) is one of two of the most successful file protocols in the history of computing. From the 1980s with NFSv2 through the widely deployed NFSv3 in the 1990s, and now with today's NFS4.1 standard – and if you don't know about NFSv4.1 and pNFS (parallel NFS), you should – the protocol has been developed to keep pace with user requirements and the changing nature of data access and processing.…

Microsoft tripped up by Blighty's techie skills gap

Posted: 29 Feb 2012 01:03 AM PST

Unis not working hard enough to please us, says UK chief

One of the UK's top Microsofties told MPs on Tuesday that even the mighty Windows maker was feeling the impact of Blighty's skills gap.…

Nepal asks for a leg-up to nail Everest's height

Posted: 29 Feb 2012 12:29 AM PST

Appeal for foreign help probably not directed at China

The Nepalese government has been forced to ask for international assistance in nailing the exact height of Everest, less than a year after it declared it was more than capable of settling the matter once and for all.…

New tool turns any marketing wonk into a mobile app whiz

Posted: 29 Feb 2012 12:01 AM PST

FrontPage-like drag-n-drop software development

MWC 2012  Calling a company Antenna when what you make is an abstraction platform, rather than antennas, might not be sensible – especially at a congress stuffed with mobile techies – but what the firm actually does works well for the trend of this age. Technology follows fashion more than we'd like to admit, and apps are where it is at.…

How to Display a Modal Using CSS

How to Display a Modal Using CSS


How to Display a Modal Using CSS

Posted:

Displaying a modal using CSS requires only the use of a few very specific lines of code. Display a modal using CSS with help from a web and graphics specialist in this free video clip.

How to Use the Fade Button on CSS

Posted:

The fade button on CSS is designed to be used in a very specific way. Use the fade button on CSS with help from a web and graphics specialist in this free video clip.

How to Create a Shadow Border in CSS

Posted:

Creating a shadow border in CSS can really improve the visual aesthetics of the project that you're working on. Create a shadow border in CSS with help from a web and graphics specialist in this free video clip.

How to Create CSS Codes for Cursors

Posted:

Creating CSS codes for cursors isn't nearly as difficult as you might imagine. Create CSS codes for cursors with help from a web and graphics specialist in this free video clip.

How to Create Vertical Gradient Lines in CSS

Posted:

Creating vertical gradient lines in CSS requires you to employ a few very specific techniques. Find out how to create vertical gradient lines in CSS with help from a web and graphics specialist in this free video clip.

A walk through the expo at RSA Conference

A walk through the expo at RSA Conference


A walk through the expo at RSA Conference

Posted: 28 Feb 2012 03:29 PM PST

The much anticipated expo at RSA Conference 2012 today opened its doors in great style. Here's the first of several galleries we'll have from the show. For up-to-date conference news check out our ...

Shaping the future of information security

Posted: 28 Feb 2012 12:21 PM PST

Once again, the Innovation Sandbox proved to be one of the most interesting events at RSA Conference 2012, as ten creative companies got a moment in the spotlight to present their newly developed tech...

We are at another inflection point, says Microsoft

Posted: 28 Feb 2012 11:59 AM PST

At the RSA Conference 2012, Scott Charney, corporate vice president of Microsoft Trustworthy Computing, shared his vision for the road ahead as society and computing intersect in an increasingly inter...

Infected government computers getting cleaned

Posted: 28 Feb 2012 11:36 AM PST

As the date of the planned shutdown of the clean servers that constitute the only link to the Internet for the 400,000 or so computers still infected with the DNSChanger malware looms near, the US gov...

Security for MySQL and Teradata databases

Posted: 28 Feb 2012 10:33 AM PST

McAfee announced its new McAfee Database Activity Monitoring solution offering reliable, real-time protection for business-critical databases. The solution enables organizations to achieve much gr...

Firewalls for service providers and carriers

Posted: 28 Feb 2012 09:46 AM PST

Fortinet announced two additions to its next-generation firewall product family that are designed to meet the growing threat protection and IT infrastructure control requirements of large enterprises,...

Protection against malicious URLs and attachments

Posted: 28 Feb 2012 09:03 AM PST

Invincea announced the availability of a greatly expanded product suite to address emerging vectors of attacks against users. Building off of its approach to breach prevention which focuses on s...

Desktop isolation technology for secure browsing

Posted: 28 Feb 2012 07:53 AM PST

OPSWAT announced the launch of Secure Virtual Desktop (SVD), a new desktop isolation solution that protects users and organizations from data loss by creating an isolated environment for accessing the...

Researchers work on self-healing cloud infrastructure

Posted: 28 Feb 2012 07:01 AM PST

Cloud computing has become completely ubiquitous, spawning hundreds of new web based services, platforms for building applications, and new types of businesses and companies. However, the freedom, flu...

Automated managing of enterprise assets

Posted: 28 Feb 2012 06:28 AM PST

Qualys announced the availability of hierarchical Dynamic Asset Tagging for its QualysGuard Cloud Platform and suite of applications for security and compliance. The patent-pending technology enab...

Only 34% of businesses enforce encryption on removable devices

Posted: 28 Feb 2012 06:16 AM PST

Imation revealed the results of a recent survey of 302 IT decision makers in the US and Canada, which say that 37 percent of them reported that their business had unintentionally exposed corporate dat...

A platform to stop APTs and malware

Posted: 28 Feb 2012 05:21 AM PST

Bit9 announced the Bit9 Advanced Threat Protection Platform that protects all enterprise endpoints, servers and private clouds from cyber-attacks that bypass older antivirus and behavioral security so...

Alleged SMS Trojan makers indicted in France

Posted: 28 Feb 2012 05:01 AM PST

Two men recently arrested in France stand accused of having developed a mobile Trojan app that stole money from Android users, reports L'Informaticien (via Google Translate). The two - one of whom ...

Detection and securing of built-in passwords

Posted: 28 Feb 2012 03:32 AM PST

Lieberman Software announced that the company's privileged identity management product, Enterprise Random Password Manager (ERPM), now offers a solution to identify known, built-in administrator passw...

RSA enhances its threat intelligence delivery platform

Posted: 28 Feb 2012 03:02 AM PST

RSA announced that RSA NetWitness Live service now provides 30 percent more threat content, customized content distribution capabilities and new integration with RSA's analytics platforms. The RSA ...

Competitors blamed for over half of the DDoS attacks in the US

Posted: 28 Feb 2012 01:44 AM PST

One in three organizations (31%) has suffered one or more Distributed Denial of Service (DDoS) attacks in the last 12 months, according to independent research commissioned by Corero Network Security.

Cloud web application firewall by Qualys

Posted: 28 Feb 2012 01:21 AM PST

Qualys unveiled its new QualysGuard WAF service for securing web applications. The new service, delivered as part of the QualysGuard cloud platform and suite of integrated applications, provides p...

Automated encryption for cloud storage

Posted: 28 Feb 2012 01:16 AM PST

Sophos announced the latest version of its data protection solution, SafeGuard Enterprise, which offers the industry's first enterprise cloud encryption capabilities, protecting critical data in publi...

RSA Conference and the search for innovation

Posted: 27 Feb 2012 03:20 PM PST

The most influential information security gathering of the year, RSA Conference 2012, opened its doors today in San Francisco. Help Net Security is on site, so here's a few photos from the first day. ...