RSA Conference 2012
A walk through the expo at RSA Conference 2012, part three
The RSA Conference expo continues to draw large crowds each day. Here’s another look at the show floor, with more interesting booths. For up-to-date conference news and …
A holistic view of threat and vulnerability risk
Rapid7 and Modulo announced they are working together to deliver an holistic view of threat and vulnerability risk, correlated with broader regulatory, policy and compliance …
Video: Trustworthy Internet Movement Initiative
During his keynote at RSA Conference 2012, Philippe Courtot, Chairman and CEO at Qualys, addressed issues facing the entire information security industry. Courtot also …
Virtual scanners for consultants, enterprises and the cloud
Qualys announced virtual scanner appliances for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance. The new software-based virtual …
Encryption critical to improved security posture
Encryption is finally seen as a strategic issue and organizations are increasing their investment in encryption across the enterprise in response to compliance regulations and …
Mobile one-time password app
OneLogin announced the debut of its mobile one-time password (OTP) app, which lets users perform multi-factor authentication with the click of a button. Available on all major …
Turning mobile devices into enterprise credentials
Entrust is extending its Entrust IdentityGuard strong authentication platform to offer smart credentials on mobile devices for enterprise-grade security. Taking advantage of …
Non-profit org aims to solve Internet’s security issues
Just thirty years from its initial appearance on the world’s computing stage, the Internet is now so embedded in business and society that life without it is almost …
A walk through the expo at RSA Conference 2012, part two
The expo floor at this year’s RSA Conference is bigger than ever, with numerous companies exhibiting for the first time. Here’s another look at the show floor, …
Employees are deliberately disabling security controls
Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …
EMC unveils five new security advisory services
Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …
Cloud-based security with embedded wireless access
Cybera announced the Cybera ONE Platform now delivers its full suite of cloud-based security services, as well as remote backup and recovery, over high-speed wireless 3G and …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments