Photos: RSA Conference 2010 Expo, part 3 |
- Photos: RSA Conference 2010 Expo, part 3
- Best cloud identity provider in the world: you
- US cybersecurity plans revealed
- Introduction to Hacktics' Seeker web application vulnerability scanner
- Proactive forensic toolkit for threat-based policies
- Software crackers can actually hurt you
- Quarantine and taxation to stomp out malware?
- Massive Mariposa botnet shut down
- Tokenization that eliminates data collision
- Secure borderless networks architecture
Photos: RSA Conference 2010 Expo, part 3 Posted: 03 Mar 2010 01:21 PM PST Here's a glance at the RSA Conference 2009 expo floor. The featured companies are: nCircle, Websense, Symantec, ST Electronics, Barracude Networks and the FBI. ... |
Best cloud identity provider in the world: you Posted: 03 Mar 2010 01:06 PM PST MultiFactor SecureAuth announced an integrated 2-factor authentication solution that enables an enterprise to become an instant identity provider (IdP) for cloud based applications such as Google Do... |
US cybersecurity plans revealed Posted: 03 Mar 2010 11:18 AM PST "In order to be successful against today's cybersecurity threats, we must continue to seek out innovative new partnerships not only within government, but also among industry, government and the A... |
Introduction to Hacktics' Seeker web application vulnerability scanner Posted: 03 Mar 2010 08:58 AM PST At the RSA Conference 2010 Innovation Sandbox, we met up with Ron Porat, CEO of Hacktics and recorded a short podcast in which he introduces their flagship product Seeker. Seeker is a web ap... |
Proactive forensic toolkit for threat-based policies Posted: 03 Mar 2010 08:40 AM PST Norman ASA announced its Forensic Toolkit, which enables organizations to investigate client activity and provides a management console that makes it easy to apply policies to proactively eliminate ... |
Software crackers can actually hurt you Posted: 03 Mar 2010 08:22 AM PST The economic crisis has dented your budget? You might have not done it before, but now you're thinking about cracking legitimate software instead of paying the fee. Think again - you might get more th... |
Quarantine and taxation to stomp out malware? Posted: 03 Mar 2010 07:33 AM PST Is the quarantine of infected computers and setting up an internet usage tax the way to go about defusing the malware threat? Scott Charney, Corporate Vice President for Trustworthy Computing at Mic... |
Massive Mariposa botnet shut down Posted: 03 Mar 2010 04:27 AM PST Mariposa botnet has been shut down and three suspected criminals accused of operating it have been arrested by Spanish law enforcement. Mariposa stole account information for social media sites and ... |
Tokenization that eliminates data collision Posted: 03 Mar 2010 03:21 AM PST Protegrity announced a tokenization enhancement to the Protegrity Data Protection System (DPS) 5.2, the newest version of its data protection platform. Tokenization is the process of substituting... |
Secure borderless networks architecture Posted: 03 Mar 2010 03:18 AM PST Cisco announced the Cisco Secure Borderless Network architecture, which evolves enterprise security by focusing on four critical anchors: enterprise endpoints (mobile or fixed), the Internet edge, t... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment