RSA Conference 2011
Most organizations can’t access critical security data
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
Securing the enterprise: Insight from Qualys
In this video, recorded at RSA Conference 2011 in San Francisco, Qualys Chairman and CEO Philippe Courtot talks about the myriad of innovations coming from the company: Next …
Corporate espionage via social networks
We’ve all heard about HBGary Federal’s COO Aaron Barr’s claims that he leveraged the information gathered on various social networks to discover the …
Video: RSA Conference 2011 showcase
In this RSA Conference 2011 video showcase, you can check out the look and feel of the event and the expo floor. The companies featured in the video are Qualys, Secunia, …
Virtualization platform for multiple OSes and apps
As a new participant to the RSA Conference, LynuxWorks demonstrated its LynxSecure high-performance, secure virtualization platform. The LynuxWorks platform allows multiple …
Photos: RSA Conference 2011 Expo, part 2
The expo floor is teeming with knowledge, solutions and possibilities: The Secunia booth. Splunk demoing their product. The Cenzic booth. The Motorola AirDefense booth. Ivan …
One-time password authentication for MS DirectAccess
Gemalto announced that its Strong Authentication Server and Protiva OTP Tokens have been integrated with Microsoft DirectAccess. The Protiva OTP token adds another layer of …
Information security pros stretched thin and overworked
A study based on a survey of more than 10,000 information security professionals worldwide finds that a growing number of technologies being widely adopted by businesses are …
Managed file transfer with large enterprise clustering
Axway introduced large enterprise clustering for its SecureTransport offering. SecureTransport simplifies and secures file transfers between people, sites, applications and …
Distributed security architecture for security enforcement
The new borderless organizations have dramatically changed the definition of how, when and where people work, causing a need to redefine the way security solutions are built …
Comprehensive vulnerability, configuration, OS and app auditing
nCircle announced that its solutions now audit for over 40,000 conditions including vulnerabilities, configurations, operating systems and applications. The company also …
Real-time threat intelligence delivery
As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments