Wednesday, February 7, 2007

IT security goes mainstream at RSA Conference

How will IT security be integrated with physical access control??

"Protection from internal threats, such as accidental or malicious disclosure of confidential information, is expected to be a major topic this week. Websense is expected to unveil its new Content Protection Suite and McAfee also is entering the space crowded with smaller players such as Vontu, Code Green Networks and GTB Technologies."

OK - How will all of those be integrated? Does anyone really believe one company can provide all the answers?

Dynamic Security can integrate these systems if they have an interface...

Feb 6, 2007 3:39 PM

The annual RSA Conference is showing evidence of a maturing information security industry with an increasing role for big-name companies. The event has developed into an annual gathering for corporate IT pros and a showcase for hundreds of companies, small and large, that market security products and services to businesses.

Security is becoming more structured and part of the IT infrastructure at companies, instead of being added on later, analysts tell USA Today. Companies including Oracle, Microsoft, Sun Microsystems, Cisco Systems and Intel are vying for a piece of the pie, which may hurt the smaller industry players, they add.

"There seems to have been a recognition among some of the larger vendors that they can make money with security or, more likely, that they're not going to make any money if they don't have security in the future," said Gartner Analyst Ray Wagner. "That's certainly going to hurt some of the smaller vendors."

Case in point: Database giant Oracle for the first time will have a major presence at the RSA Conference. The company will promote its identity management products as well as software to secure the applications it sells to help large enterprises with things like accounting and human resources. Oracle CEO Larry Ellison is slated to deliver a keynote speech at the San Francisco event.

Microsoft Chairman Bill Gates kicked off the conference Tuesday in a keynote.

"In a lot of ways security is becoming more boring," Andrew Jaquith of the Yankee Group tells USA Today. "But boring is good. Boring means maturation. Boring means you're seeing large companies like IBM have a really rounded out security story. This is good for the mainstreaming of security into the way people run their business."

As products have become more mainstream, so have the RSA attendees. The bulk of the event is geared to less specialized visitors. "Security concerns are moving away from tech geeks with pocket protectors monitoring networks in a back closet somewhere, to something that business managers and more senior folks are concerned with," says George Tubin, an analyst with TowerGroup.

Of the more than 340 exhibitors at the RSA Conference in San Francisco's Moscone convention center, many companies in the security arena are using the event to announce new initiatives, products or product updates.

Protection from internal threats, such as accidental or malicious disclosure of confidential information, is expected to be a major topic this week. Websense is expected to unveil its new Content Protection Suite and McAfee also is entering the space crowded with smaller players such as Vontu, Code Green Networks and GTB Technologies.

Labels: , ,

VA investigating another missing hard drive

Cybercrime pays and repeats itself. Dynamic Security could protect against unauthorized removal of equipment.

Grant Gross February 05, 2007 (IDG News Service) -- The Department of Veterans Affairs (VA) is investigating a missing hard drive containing the personal records of 48,000 military veterans, the agency said.

The external hard drive contained about 20,000 personal records that were not encrypted, according to information from Rep. Spencer Bachus (R-Ala.). A VA employee reported the hard drive missing from a Birmingham, Ala., agency facility on Jan. 22, according to a VA press release.

The VA and the FBI are investigating the missing hard drive, the VA said in its Friday press release. The VA's Office of Information and Technology is conducting a separate investigation, Secretary of Veterans Affairs Jim Nicholson said in a statement.

"We intend to get to the bottom of this, and we will take aggressive steps to protect and assist anyone whose information may have been involved," Nicholson added.

In May 2006, the VA reported a laptop and hard drive containing the personal records of 26.5 million military veterans and their families had been stolen from an employee's home. Police later recovered the hardware, and the VA said computer forensics tests indicated thieves had not accessed the data. However, the theft set off criticism from several members of Congress about the VA's cybersecurity practices.

The hard drive in Alabama was used to back up information contained on an employee’s office computer and may have contained data from research projects the employee was involved in, as well as personal information, the VA said.

The VA Office of Inspector General has seized the employee’s computer and is analyzing its contents, the VA said. The VA is prepared to notify affected people and provide free credit monitoring, the agency said.

The VA will continue to aim to be a leader in protecting personal information, Nicholson said in his statement.

In August, the VA also reported that a desktop computer containing the personal information of 38,000 veterans was missing from the office of Unisys Corp., the subcontractor assisting at the agency's medical centers in Pittsburgh and Philadelphia.

The lost VA hardware prompted a congressional review of other U.S. government agencies, and agencies reported thousands of l

Labels: , , ,

Study: Users ignore bank security features

Study: Users ignore bank security features

Not like it's their money or anything

Jeremy Kirk February 05, 2007 (IDG News Service) -- Users of online banking sites tend to bypass critical clues that the integrity of those sites may have been compromised, according to the working draft of a study released on Sunday by researchers at Harvard University and the Massachusetts Institute of Technology.

The study, which will be formally released in May at the IEEE Symposium on Security and Privacy in Oakland, California, underscores how new technologies and warnings can't completely protect Internet users from scams such as phishing.

It also throws doubt on the effectiveness of site-authentication images, which have been implemented by financial institutions such as Bank of America Corp., Vanguard Group Inc. and ING Bank FSB. The images, selected by the customers, are shown when a bank customer logs in from a different computer than is normally used.

The study involved 67 users, with more than 90 percent under 30 years old. Because of varying parameters in the study, not all qualified to be included in the results for each of the three tests. Users were ask to conduct common online banking tasks, although precautions were taken to ensure users weren't put at risk.

For the first test, HTTPS indicators -- which show that an encrypted connection is enabled -- were removed from the address bar along with the lock that appears in the bottom right corner of Internet Explorer 6. Although the absence of HTTPS indicators should be a warning, all 67 participants continued with their transactions, the study found.

The researchers then conducted a test where the site-authentication image was removed along with the HTTPS indicators. The researchers believe it is the first empirical investigation into site-authentication images.

Only two of 60 people chose not to log in when the image was removed, a key sign that a site may have been tampered with or is a phishing site, the study said. Of users who were actually using their own bank account for the study, 23 of 25 continued to enter their passwords.

"We find them [site-authentication images] to be ineffective," the study concludes.

In the last test, researchers made it more obvious, this time replacing a password-entry page with a warning page from Internet Explorer 7 Beta 3. The page advises of a problem with the security certificate of the chosen Web site. Despite the warning, 30 of 57 users entered their passwords.

The study comes as U.S. banks are beefing up their authentication technologies amid new requirements from federal regulators.

In October 2005, the Federal Financial Institutions Examination Council (FFIEC) mandated that U.S. banks implement stronger authentication protections by the end of last year, particularly for high-risk transactions such as sending money to a different person's account.

Bank of America uses site-authentication image technology called SiteKey. Users pick an image and assign a phrase to it while also setting three "challenge" questions. If a user logs in from a computer that doesn't already have a cookie, they're asked one of the challenge questions and then to verify the image and phrase.

If the image doesn't appear or the phrase is wrong, consumers shouldn't proceed. Bank of America said the image system benefits users since it's free and doesn't involve extra hardware or software.

Labels: ,

Cisco focuses on security product integration

"After years of acquisitions, Cisco is just now starting to hook its security products together, said Robert Whiteley, a senior analyst at Forrester Research Inc."

And if you have the old versions, and those of other firms, Dynamic Security can put them together for you.

Cisco focuses on security product integration

Vendor set to unveil several security offerings at RSA Conference

Robert McMillan February 06, 2007 (IDG News Service) -- Over the next few months, Cisco Systems Inc. plans to enhance a range of its security products, offering customers an integrated and improved line of products.

The company plans a major new release to the software that runs its Adaptive Security Appliance (ASA) product. Also in the works are updates to its Intrusion Prevention System (IPS), the Cisco Security Agent (CSA), the Cisco Security Manager (CSM), and its Mitigation Analysis and Response System (MARS).

The upcoming Version 8.0 of the ASA software will include about 120 enhancements, but perhaps the most significant change is that its AnyConnect VPN client will now work on a much broader range of platforms, including Windows Vista, Mac OS X, Linux and Windows Mobile 5.0 Pocket PC Edition.

"We're extending this out of the traditional realm of just laptops," said Bob Berlin, a Cisco senior product marketing manager.

Cisco is also improving the information-sharing capabilities between its IPS 6.0 and CSA 5.2 software to make the products better able to identify and block emerging threats. Another new feature will allow CSA to assign quality-of-service tagging to network traffic so performance can be boosted on applications such as voice over IP.

Using engineering talent it acquired in its 2004 purchase of Riverhead Networks, Cisco has also developed new algorithms that allow the IPS software to better analyze potentially malicious activity on a network. The ISA software will also be better integrated and easier to manage with the upcoming Version 3.1 of CSM.

After years of acquisitions, Cisco is just now starting to hook its security products together, said Robert Whiteley, a senior analyst at Forrester Research Inc.

This is critical if Cisco wants to maintain its new position as a player in the security space, he said. "Whether people acknowledge it or not, Cisco is one of the largest security vendors," Whiteley said. "But they haven't had quite as much of an integrated story as you'd see from a [security ] specialist."

Cisco has had a lot of integrating to do. The company has made about 10 security-related acquisitions in the past three years. It now takes in more than $2 billion in annual revenue from security product sales, and it employs more than 1,400 security engineers, according to Richard Palmer, senior vice president of Cisco's Security Technology Group.

Cisco may be starting to integrate its existing security products now, but it would also like to extend its offerings to address new areas such as data leakage -- a hot new area in the security field. "That's certainly an area where we're going to be investing, " Palmer said.

Labels:

Excel vulnerable to new attack

There is always another way for hackers to get in. Dynamic Security can help keep them out.

________________________________________________________
Excel vulnerable to new attack

A critical flaw in Excel is attracting malware writers, says Microsoft,
and the problem may affect other Office components as well.


http://cwflyris.computerworld.com/t/1247867/6626861/49955/2/

Labels: ,

FW: $4 billion for Joint IED Defeat Organization

 

 

Homeland Security Daily Wire - The business report

 

Sign up | e-mail to a colleague | print version         Vol. 3, no. 24, Tuesday, 6 February 2007


SysTech Rios - The Premier Radio InterOperability System


The Radio InterOperability System bridges the communications gap between disparate radios, satellite, cell, and VoIP phones



Click Here


Bruker

Scan stadiums or large areas for dangerous chemical vapors in seconds. Rely on Bruker instruments for special event protection.


Lally & Lally

Practicing international business law for more than 45 years New York (main office) Washington, Miami, Dublin, London, Zurich, Manila Tel (U.S.) 516-741-2666 Lally.Lally@verizon.net



Atlas Interstate Agent


Serving all your transportation, shipping, storage, and relocation needs. Military / ISO certified.

Sagem Morpho Inc.

In                               Today's Issue

 

The Front Page

 

Allocation would be a major improvement over previous years; IEDs continue to take a toll, yet technological responses remain problematic; other budget winners include the Future Combat System and BioSense full story

 

Designed for use within the Tactical Medical Coordination System, RFID system will track casualties and medical supplies via RFID wristbands placed on casualties in the field; SkyeModule M1-mini continues to earn raves after a banner 2006 full story

 

Computer Sciences Corporation will convert A-files in anticipation of a guest worker program; DHS gains the ability to share critical data; CSC shows why it is such a lucrative takeover target full story

 

Inspector general notes 321 arrests in a six-month period, including a disturbing number of rapes and flashings; defrauding the government also a serious problem; report recalls similar problems in Sweden full story

 




Biometrics & identity authentication

Bankruptcy proceedings offer a ripe opportunity for Sony just as it launches its own video analytics suite; IPIX's gigapixel camera a tasty morsel; Steve Hunt provides an analysis of Sony's future success and IPIX's past failures full story

 

Purchase gives Dutch company an even firmer grip on the ePassport inlay business; Multitape known for its etching technology full story

 

After agency spends $750,000 to catalyze the market, vendors will have to contract with private laboratories for HSPD-12 certification; costs seen as on the downswing; seventy-five vendors have already been approved full story

 

Trade association works to distinguish RF from RFID technology; privacy and utility major concerns as well; industry encouraged to ensure data protection and communicate more effectively with users full story




* Steven Goldberg replaces Brooks McChesney



The Front Page

Radio-controlled IEDs remain the greatest threat to troops in Iraq these days, and thus developing systems to counter them is a major priority for the Defense Department. Not that such is an easy task. Readers may perhaps remember our earlier report that IED jammers currently in use in Iraq and Afghanistan have had the unfortunate effect of also interfering with tactical radio systems, particularly those belonging to the Naval Sea Systems Command. Not that the problems are unsolvable. They just require more money, which is exactly what they will get under the 2008 budget proposed this week by President Bush. DoD has asked for $4 billion in funding in its fiscal 2008 budget and $2.4 billion in its fiscal 2007 supplemental budget for the Joint IED Defeat Organization. These numbers are an improvement on the $1.9 billion allocated to the organization in 2007 and the $3 billion provided in 2006.

Overall, Bush requested roughly $481.4 billion for the Defense Department for fiscal 2008 -- an 11.3 percent increase over 2007. A few specific budget winners in the president's proposal: The Army's Future Combat System, which will receive a $300 million increase for a total of $3.7 billion; $1.6 billion for research and development related to chemical and biological warfare; and $88 million for the BioSense biosurveillance program, $10 million more than approved by Congress for 2007.

Bush has also requested $46.4 billion in funding for the DHS in fiscal 2008, of which $1 billion is planned for the SBInet program to support innovations and integration of infrastructure and technology along U.S. borders. Another $224.2 million has been requested to support the TSA screening operations. Altogether the budget request is an 8 percent increase over that of 2007.

-read more in Bob Brewin's FCW report; to find more detailed information about the homeland security budget see the DHS Web site

 


 

Sdema Group - securing your future

 


Here is a technology certain to interest Newt Gingrich, who has dedicated his post-congressional life to digitizing medical care: Westminister, Colorado-based Skyetek (motto: "RFID as a feature") has teamed up with Glen Head, New York-based ACC Systems to develop a handheld RFID reader to identify, locate, and track casualties and medical resources. Designed for use within the Tactical Medical Coordination System (TacMedCS) deployed by military and civilian responders, the SkyeTek-ACC system will be used to read RFID medical wristbands placed on casualties or refugees, as well as electronic dog tags worn by personnel in the field. By collecting and processing such data, planners can more accurately distribute medical supplies.

Under the deal, SkyeTek will provide ACC with its SkyeModule M1-mini RFID module. Smaller in size than a quarter, the M1-mini is said to be the world's smallest self-contained, multi-protocol 13.56 MHz OEM module on the market. "We selected SkyeTek for our RFID reader module because we believe the company's Advanced Universal Reader Architecture is a significant innovation in terms of reader technology," said ACC's Victor Sackett. "SkyeTek's M1-mini provides an optimum combination of performance, reliability, and tag support that places it at the forefront of the current marketplace." There is no doubt about it. In 2006 SkyeTek achieved 144 percent growth in revenue bookings year-over-year, fueled in large part by ReaderWare software license sales, which exceeded 50 percent of revenue this past year and are expected to surpass 60 percent during 2007.

-read more in this report

 


Chalk up another win to El Segundo, California-based Computer Sciences Corporation. Last year we reported that the company was being eyed as a potential takeover target by various private equity firms, in part owing to its success in landing deals with the IRS ($36 million), BAE Systems ($1.9 billion) , DuPont ($1.6 billion to $2 billion), and MBDA ($100 million). Now we can report an additional success: a $5.9 million deal with the Citizen and Immigration Services (USCIS) agency to develop the Integrated Digitization Document Management Program (IDDMP), which aims to convert so-called "alien files" (or A-files) from paper to digital format.

USCIS maintains an archive of more than fifty-five million A-files, which are used to make decisions about immigrants' applications for citizenship and other benefits. Under the agreement, Computer Sciences will capture and retain scanned and electronic images for each file, which can each contain anywhere from one to hundreds of pages, and make them available to authorized users from a single document repository. "The system will allow Homeland Security users across the agency to search, track, organize and view records, process cases more quickly, and manage and share vast quantities of data while protecting sensitive information," said CSC's James Sheaffer. In the future the system might also serve as the backbone of a guest worker program.

Other companies involved in the project are Alexandria, Virginia-based Perpetual Logic; San Francisco, California-based Taxonomy Strategies; and McLean, Virginia-based Washington Consulting.

-read more in this company news release

 


Infragard


DHS and its subordinate agencies -- Customs and Border Protection, Immigration and Customs Enforcement, the Transportation Security Administration, and the Citizenship and Immigration Services -- are used to asking travelers to remove articles of clothing and submit to intrusive inspections. Such is the price an American citizen must pay if he wishes to be protected against the threat of foreign terrorists and illegal Mexican fry cooks. Sad to say, however, much of the disrobing is not being performed under what we might call official sanction--or for any official purpose.

Readers may recall an earlier report of ours regarding what we called "passport pornography," in which Swedish border guards were collecting the photographs of beautiful young maidens in a special folder. America has similar problems. According to a recent report by the DHS Inspector General there were in one single six-month period "321 arrests, 333 indictments and 243 convictions" of department personnel, with many of the convictions for sexual crimes ranging from "exposure of sexual organs" to a juvenile female to attempted oral copulation and sexual battery under duress. (There were also the standard acts of bribery, theft of government property, and defrauding the government.) These reports are disturbing. The employee who is busy cheating the government out of its own property is at least thinking about his work. The flasher and rapist commit two sins: sexual immorality and goldbricking.

-read more in Michael Hampton's Homeland Stupidity blog post

 


 

Biometrics & identity authentication


Sony acquires IPIX's intellectual property for $3.6 million

Last year, we quoted Clara Conti, the CEO of Reston, Virginia-based IPIX remarking on the growth of the video analytics business: "When I started, there were only two companies doing video analytics," she said. "Now there are thirty companies doing this or at least claiming to do this." Perhaps by now there are more than thirty, but IPIX is not one of them any longer. The company is now in bankruptcy court, and the vultures are circling to snatch up the remains. One of these scavengers is Sony, which SecurityInfoWatch reports has acquired IPIX's core intellectual property at a price of $3.6 million. The portfolio includes IPIX's gigapixel camera for situational awareness software -- a good move for Sony which recently launched its own suite of video analytic technology with the DEPA product line. Our good friend Steve Hunt of 4A International had this to say:

The IPIX technology is going to be worth a thousands time more to Sony Corporation than it ever could have been to IPIX. Sony is a company made up of engineers, and they make their money not only from their own branded products, but the biggest part of their revenue comes from all of the Sony components that they sell that other people put in their products. So the IPIX technology could appear in a number of cameras, processor, TVs and high-end video equipment. It could go in a thousand places once you rip it apart for its parts.

Why did IPIC go under? Hunt explains:

They didn't have the right partnerships, and they didn't play the game right, such as playing nice with other video management systems. Their sales channel also didn't work. You have to make your product available in a way that customers want to buy it, and they didn't succeed in creating that successful sales channel.

-read more in this SecurityInfoWatch report

 


Now that its antenna inlay patent dispute with Germany-based Assa Abloy Identification Technologies has been resolved, Netherlands-based Smartrac N.V. is back in the thick of the ePassport game. The company, which is involved in seventy of the ninety-five e-passport projects worldwide, announced this week that it had acquired a 25 percent stake in Germany-based Multitape, also manufacturer of smart card inlays, as well as etched smart labels. Under the agreement, the tow companies will cooperate in the production of RFID components. "Multitape has great expertise in etching. We will obtain access to this technology as a strategically optimal supplement to wire-embedding technology, which continues to be Smartrac's core competence," said company CEO Manfred Rietzler.

Of course, Smartrac does not need much help with the inlays themselves. Rather, the company is interested in Multitape's etching's abilities, etching being the method of cutting antenna structures out of a carrier substrate. "We regard etching technology as an option primarily for applications in logistics and access control," said Rietzler. "We are now ideally placed in these segments with high volumes and great growth potential, and can further extend our product portfolio." Smartrac also holds a 30 percent stake in Kulim, Malaysia-based Xytec Solutions, which holds patented inlay-manufacturing machinery.

-read more in this company news release

 


 

Serving all your transportation, shipping, storage, and relocation needs.
Military / ISO certified.


Bad news for prospective HSPD-12 vendors. The General Services Administration (GSA) has announced that it will soon cease paying vendors to test their products and services as HSPD-12-compliant. In May the agency installed a free testing lab in order to help companies move forward on the much-delayed mandate and has spent $725,000 on equipment and supplies to support the program. This could not go on forever, and so starting 23 April, testing "will be borne on a cost-reimbursable basis by the supplier," with GSA certifying independent testing labs who will be paid directly by the vendors. These costs, however, are expected to be relatively minor. "The efficiency of testing improves with experience; we would expect the cost to firms to be less than the costs to GSA to approve the initial approved products," said Steven Kempf of the Federal Acquisition Service.

Over the past eight months, GSA has tested products or services in twenty-two categories and approved 166 products from seventy-five different vendors. Thirty service vendors were approved, as were an additional five to provide public-key infrastructure digital certificates.

-read more in Jason Miller's Washington Technology report

 



Smart Card
Alliance publishes best practices for RF industry

It is time to crack the books. Our friends at the Smart Card Alliance Identity Council have released a guide to best practices in the RF identity management market -- the idea being to ensure customer privacy while at the same time ensuring the integrity and utility of the cards. Almost as important from the alliance's perspective is distinguishing between its RF member base and the RFID marketplace. "These new documents achieve a twofold purpose," said executive director Randy Vanderhoof. "Providing rules for good behavior when using RF-enabled technology in identity management and clearly delineating the differences between RFID and contactless smart cards that use RF and provide security and privacy protection in identity applications."

The alliance made the following recommendations:

  • Implement security techniques, such as mutual authentication, cryptography and verification of message integrity, to protect identity information throughout the application

 

  • Ensure protection of all user and credential information stored in central identity system databases, allowing access to specific information only according to designated access rights

 

  • Notify the user as to the nature and purpose of the personally identifiable information (PII) collected - its usage and length of retention

 

  • Notify the user about what information is used; how and when it is accessed and by whom; and provide a redress mechanism to correct information and to resolve disputes.

"Adherence to these best practices not only helps ensure the validity, security and integrity of vital identity information, but at the same time addresses the concerns of citizens and government officials about privacy and the growing threat of identity theft," said Vanderhoof.

-read more in this alliance news release

 


* Steven Goldberg replaces Brooks McChesney: Sunnyvale, California-based Vidient Systems, best known for its behavior recognition and video analytics software, has named Steven Goldberg as its new president and CEO. The positions were previously held by Vidient founder Brooks McChesney, who will now serve as executive vice president. Goldberg served most recently as entrepreneur-in-residence at the Menlo Park, California-based venture capital firm Venrock Associates and served previously as president and CEO of Campbell, California-based ARCWAVE, a developer of wireless networking equipment. Read more in this company news release

size=1 width=450 style='width:337.5pt' align=left>




Interpolymer

Innovative polymer solutions



Events


ISC West International Security Conference and Expo -- Las Vegas, Nevada -- 03/28-30- ISC West is where end-users of security, systems integrators, dealers, and installers cover all their security needs. Held at the Sands Expo and Convention Center in Las Vegas, ISC West will again be one of the premier security events covering most of the security industry. To register, see Web site

CIPATE 2007 - 2nd Annual Beijing International Security Conference -- Beijing, China -- 05/17-19- With a rising focus on the social security of the 2008 Olympics, Beijing Municipal Public Security Bureau is responsible for the safety of the event and enforcing the Capital's security. Hosted by the Bureau, CIPATE 2007 is an exclusive official fair before the 2008 Beijing Olympics covering government representatives, police officers, Olympic committee's security division, fire services departments, security consultants, anti-terrorism experts, embassies, customs, and planning divisions. See Web site

 



 

 

 

 

 

 

 

 

 


The Homeland Security (HS) Daily Wire is a daily newsletter offering news on
and analysis of the business aspects of the homeland security sector

Sign up for free:
signup@hsdailywire.com

Editor-in-chief: Ben Frankel --
editor@hsdailywire.com
Managing editor: Michael Davis -- management@hsdailywire.com
Senior writer: Avi Klein -- aklein@hsdailywire.com
Staff writer: Sean Cheang -- scheang@hsdailywire.com;
Web designer: Catherine Musinsky -- information@actioninteractive.net
Director of sales: Susan DeMello -- susan.demello@hsdailywire.com

Publishers: Stewart Cass, Grant Lally

Advertising:
advertise@hsdailywire.com or 202.328.1640 x 102

Editorial communications:
editor@hsdailywire.com
Events calendar:
events@hsdailywire.com

*Subscribers with AOL and Lotus Notes e-mail accounts may experience difficulties
receiving the newsletter. We suggest you use another e-mail account. If you cannot, and you
experience problems receiving the newsletter, please contact us



To unsubscribe, click unsubscribe

If there are problems with the link, please e-mail management@hsdailywire.com
with the word "unsubscribe" in the subject line

Analytica Wire Logo

Homeland Security Daily Wire | 1606 20th St. N.W., Third Floor | Washington, D.C. 20009 | 202.328.1640
 ©copyright 2005-2007 Analytica Wire, Inc. ®All rights reserved


 

 

IT security goes mainstream at RSA Conference

Business Security for business is big business...

IT security goes mainstream at RSA Conference

The annual RSA Conference is showing evidence of a maturing information security industry with an increasing role for big-name companies. The event has developed into an annual gathering for corporate IT pros and a showcase for hundreds of companies, small and large, that market security products and services to businesses. More here

Labels: ,

Made4biz Security Translating real-world security knowhow into state of the art security systems.
Made4biz Security

Turn on Sound for Demos:
Bill Gates Demo (Location-based)
Elvis Demo (Location/Context-based)
Clint Eastwood Demo (Temporal-based)

Powered by Blogger

Subscribe to
Posts [Atom]

Technorati Profile

RSS Syndication

Made4Biz Security Inc