Please turn on your JavaScript for this page to function normally.
InfoSec World 2008: Expo photos #1

Here’s a collection of photos from the show floor where the InfoSec World Conference & Expo 2008 is taking place.

InfoSec World 2008: Photos of the venue

Here’s a collection of photos of the Orlando venue where the InfoSec World Conference & Expo 2008 is taking place.

Open source code for driving security into web services

OpenLiberty, the global open source community working to provide developers with resources and support for building interoperable, secure and privacy-respecting identity …

Breach Security upgrades web application security solution

WebDefend, now in version 3.2, identifies and stops abuse of web application resources, offers higher performance, and delivers enhancements to ease enterprise-wide adoption. …

SSH Communications Security releases SSH Tectia 6.0

SSH Communications Security Corp. released SSH Tectia Client 6.0, SSH Tectia Server 6.0, SSH Tectia Manager 6.0, and the new, innovative SSH Tectia ConnectSecure 6.0. …

Change and Configuration Solutions Aid PCI Auditors

To the casual observer of the Payment Card Industry (PCI) standard, it might seem that the standard deals exclusively with the servers and point-of-sale terminals that house …

NSA certifies the Sectera Edge smartphone

The National Security Agency (NSA) has certified the wireless Sectera Edge smartphone, a product of General Dynamics C4 Systems, for voice communications classified up to the …

Brothers sentenced for selling $6+ million in pirated software

Two brothers were sentenced today in federal court to 30 months and three years in prison for selling massive amounts of pirated computer software. After receiving complaints …

Top 10 malware of the week

According to data gathered at the Infected or Not website the NaviPromo adware has been the most active malicious code this week. Adware occupies nine spots in the top ten …

WatchGuard unifies security and mobility

WatchGuard unveiled new remote access solutions designed to give remote and mobile workers highly secure connectivity to their corporate network. For enterprise organizations …

Enhanced protection for Exchange and SQL servers in a virtual environment

Companies are increasingly using virtualization for a variety of different productivity and cost saving reasons. Virtualization is being increasingly used by IT departments …

Details on the new anti card fraud mobile phone technology

A new Israeli technology brought to the U.S. by Secure Identity Systems (SIS) thwarts credit and debit card fraud, and potentially stops ID thieves in the act. This in turn …

Don't miss

Cybersecurity news