Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

RSA Conference honors top cops in cybersecurity field

Wednesday, April 22, 2009

Some of the country's best cybercops were honored yesterday at the RSA Conference 2009 in San Francisco, including award-winners in the areas of public policy and security practices.

J. Keith Mularski, the supervisory special agent for the Federal Bureau of Investigation's Cyber Initiative and Resource Fusion Unit, was recognized for his contributions in bringing down "Dark Market," an online "carding" forum that was one of the largest of its kind in the cyber underworld, according to RSA Conference.

On October 16, 2008, after a two-year undercover operation, the FBI and other international law enforcement agencies arrested 56 fraudsters and helped prevent an estimated $70 million in economic losses by breaking up the cybercriminal network.

RSA Conference also recognized Robert Lentz, deputy secretary of defense, for his work achieving nearly 100 percent deployment of the Public Key Infrastructure Common Access Cards across the Department of Defense-wide network.

Lentz is also recognized for implementing a revolutionary risk-management based information system certification and accreditation program known as the Defense Information Assurance Certification & Accreditation Program, along with other achievements in developing information-sharing systems.

"From its inception, RSA Conference has sought to identify and recognize influential individuals who are true pioneers in the information security industry," said Sandra Toms LaPedis, general manager of RSA Conference.


View more news

 
  Most Popular
. Computer Security

. Ethical Hacking

. Windows 7: the untold story of how the enterprise gets snubbed

. Open source identity: Linux founder Linus Torvalds

. FAQ: How to protect your PC against the Downadup worm

. Brocade's new CTO takes aim at Cisco

. Heartland tries to rally industry in wake of data breach

. IBM confirms layoffs

. Apple puts iPhone Nano and Netbook rumors to rest

. Microsoft 'can't imagine' PS3 catching up to Xbox 360
 
 
  Popular Searches
 
 
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html