Editor's Blog and Industry Comments
Simplifying the complexities of IT security
17 March, 2014
IT security professionals are in danger of losing sight of the basics as systems and their protection become increasingly
Keeping pace with cyber-criminals
10 March, 2014
ProSecurityZone spoke with Kaspersky Lab's senior security researcher about the changing face of malware
Rss Feed.
Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Featured News
Key management and access control integration
Traka : 15 April, 2014  (New Product)
Symmetry access control software from G4S has been integrated with the Traka32 key management software
Spam campaign exploits cheap share prices
AppRiver : 15 April, 2014  (Technical Article)
The old pump and dump scam is being exploited once more in a new spam campaign as explained by AppRiver
Dome cameras keep track of spring lambs
Axis Communications : 15 April, 2014  (Application Story)
A farm in the UK is using IP video surveillance technology from Axis Communications for tracking and monitoring livestock
UTM and firewall acceleration using Intel Core processors
Sophos : 15 April, 2014  (New Product)
A new series of hardware security appliances from Sophos gains enhanced performance using new Intel Core processors
The use of 2FA in preventing data spying
SecurEnvoy : 15 April, 2014  (Technical Article)
SecurEnvoy is attending InfoSecurity Europe to address the way 2FA can be used to close back doors and prevent data spying
UK industry failing to control insider threats
LogRhythm : 15 April, 2014  (Technical Article)
Study from LogRhythm shows the extent to which rogue insiders have free rein on company data in UK industry
Open command and control platform on show at CTX event
Synectics : 15 April, 2014  (New Product)
Synectics is attending Counter Terror Expo this month with its Synergy 3 command and control platform
Business context crucial in risk assessment
AlgoSec : 15 April, 2014  (Technical Article)
Survey results show importance of business context in the prioritisation of IT security vulnerabilities
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012 ProSecurityZone.com