In Pictures: RSA Conference 2012 (Day 2)
All this week The Tech Herald will be covering the RSA Conference.
View ArticleThe Economics of Security – A talk by Ross Anderson in 2011 AusCERT
The following is a personal summary of a conference/lecture given by Mr. Anderson in the most recent AusCERT event. This summary is just a collection of un-connected (and wrongly interpreted?)...
View ArticleRSAC 2012: RSA Conference Live! (Day 3)
This week The Tech Herald is on assignment at the RSA Conference in San Francisco.
View ArticleInternet2: Call for Nominees – 2012 Richard Rose Award
Meanwhile, the Internet2 has issued a nomination announcement targeting the 2012 Richard Rose Award. The Richard Rose Award recognizes and illustrates specific, individual efforts to extend advanced...
View ArticleWhat You Need to Know About Google’s New Privacy Policy
Don't panic. Google's new privacy policy goes into effect today. If you are among the 1 in 8 Google users who haven't even bothered to read the new privacy policy. This might be a good time to look...
View ArticleInfoSec Daily Podcast Episode 607
Episode 607 - Pentest Lessons, Live from RSA, and “No Decrypt for you”
View ArticleScenes from RSA Conference US – Wednesday
Once the skies cleared up it was another beautiful day! I wanted to show you a few more cool things I found on the show floor. For example - a Ferrari. While I don't think you could win the car, you...
View ArticleCome Visit the NETGEAR Booth 255 at RSA!
We are at RSA this year, booth 255. Feel free to stop by and check out our new Application Control feature as well as 3G/4G USB dongle support for the UTM9S!
View ArticleSBN Sponsor Post
Get a sneak peak into RSA Conference 2012 with podcasts from industry experts and speakers.http://bit.ly/fmaLXU
View ArticleWho is already an Olympic Games 2012 winner?
As announced by our Security Predictions for 2012, the imminent start of the Olympic Games 2012 is a good worldwide event for phishing authors as well as malicious bots. They will most likely begin...
View ArticleSocial Security Blogger Award Winners
So the 6th annual Security Bloggers Meet up at RSA Conference is now in the books. I don’t know about you but I thought it was our biggest and best one yet! We had about 170 folks at the party this...
View ArticleSecurity Enters the Age of Mammals
Having spent the week at RSA observing and talking to the security industry I feel that we are on the threshold of a new era in security. After lamenting a lack of innovation and bemoaning nothing new...
View ArticleDigital Assassination: Protecting Your Reputation, Brand, or Business Against...
In the 1800s, workers who became known as Luddites protested against machinery that cut the need for their own physical labor, and the name has since become synonymous with opposition to technological...
View ArticleWindows 8 consumer preview downl…
Windows 8 consumer preview download: Beta reaction roundup #ITBW The Windows 8 consumer preview download (or 'beta') has been downloaded and picked over by all our favorite bloggers. Microsoft...
View ArticleTraffbiz: A new malicious twist on affiliate partnerka schemes?
Russian web users at risk as Traffbiz spreads affilate web-based malware attacks.
View Articlecee-enhanced event log to syslog forwarding
As many know, we at Adiscon also work hard at Windows Event Log to syslog forwarding software. During the past days we have taken the time to implement cee-enhanced syslog format inside these products...
View ArticleAnnouncing Veracode Defender – A tower defense video game
I’d like to bring your attention to a Veracode Marketing first! We just released a retro, 8–bit feel, “tower defense” video game to promote our new reporting capabilities that deliver positive,...
View ArticleTrend Micro Releases New Consumerization And BYOD Research
Results show companies need to find new ways to ensure that networks and employees' mobile devices are protected
View Article