Please turn on your JavaScript for this page to function normally.
Photos: RSA Conference Europe 2009 expo floor

Here is our first set of photos from the expo floor of this year’s RSA Conference Europe. If you missed previous photos from keynote sessions, click here.

The security implications of cloud computing

Nowadays, cloud computing is one of the most talked about topics that’s been the spark of many heated debates especially when it comes to security issues. In this …

Open source penetration testing framework Metasploit acquired by Rapid7

Metasploit, one of the top open source penetration testing frameworks, has just been acquired by Rapid7, a provider of vulnerability management, compliance and penetration …

BioP@ss paves the way for EU electronic ID cards

Chip manufacturers Infineon and NXP Semiconductors, and chip card maker Giesecke & Devrient are among the eleven companies from six EU countries participating in BioP@ss, …

IBM’s open-source alternative to Windows 7

IBM and Canonical are introducing a cloud- and Linux-based desktop package in the U.S. designed for use on a company’s existing fleet of PCs and low-cost netbooks. The …

Cybercriminals employ persuasive online scare tactics to sell rogue security software

Symantec announced the findings of its Report on Rogue Security Software. The findings, based on data obtained during the 12-month period of July 2008 to June 2009, reveal …

Security consulting services offered by RSA

RSA announced new consultative and advisory services to help enterprises implement or improve their security operations function to more effectively manage both risk and IT …

End-point security that can’t be disabled by the end-user

DeepNines Technologies announced iTrust Agent, an end-point security solution that allows organizations to enforce Acceptable Use Policies, security policies and content …

Oracle releases critical patch update – October 2009

Oracle has released its critical patch update which contains contains 38 new security fixes across all products. Some of the vulnerabilities addressed affect multiple …

The dangers of exposing information on social networking sites

In this podcast, Dr. Herbert Thompson, the Chief Security Strategist at People Security, discusses the variety of information that we, and those connected to us, disclose via …

Social media insight for the U.S. intelligence community

Visible Technologies announced a strategic partnership and technology development agreement with In-Q-Tel, the independent strategic investment firm that identifies innovative …

Top IT management trends – the next 5 years

Computerworld reports that according to Gartner’s research, client virtualization, more data, less energy consumption, resource tracking, social networks in the …

Don't miss

Cybersecurity news