Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
CERT

The Computer Emergency Response Team was originally set up by Carnegie Mellon University in the late 1980s in response to the first widespread infection of computers by malicious software. With Government funding, CERT was set up to counter future problems of this nature. Since then, many commercial companies have been established to counter the threat of malicious code but CERT still operates as a centre of research and expertise and its role has expanded to encompass all aspects of computer and network security.

Long range identification ANPR
Nortech is supplying Nedao's ANPR access HD system for supporting long range vehicle identification in the UK
Video door entry for South London luxury flats
Urmet has supplied London property developer with IP video door entry equipment to secure access to a new block of luxury flats
Apprentice security installer awards open
The British Security Industry Association has opened its 2015 award competition for the best apprentice security installer
Research reveals continued risk from heartbleed
Incomplete remediation from heartbleed leaves UK companies at risk a year after the vulnerability was first recognised
Improved network visibility and security at Norwich School
ForeScout CounterACT is providing the independent Norwich School with network visibility, regulatory compliance and potential breach mitigation
Retrofit door handles for easy security upgrades
The Retro3 door closures from Union can directly replace Briton 2004 equipment whilst maintaining fire integrity
Tackling Today’s Authentication Complexities
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
Payment card industry compliance consultancy available
Foregenix is offering a free service to provide consultancy on meeting Payment Card Industry standard compliance
Video management integration with ANPR
Viper licence plate recognition software integrated with the exacqVision video management system from Exacq Technologies
Increase in cyber attacks affects all sizes of companies
Darren Anstee, Director of Solutions Architects at Arbor Networks puts perspective on the cyber security landscape and shows it isn't just large companies that are at risk
Insecure personal data on wearable technology
Kaspersky Lab discovers security flaws exposing personal data to risk when using wearable technology for fitness assessment
Call for cloud-based digital signature recognition in EU standards
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate
Secure Email and FTP protects sensitive pupil data
Primary school in London borough of Ealing adopts e-mail and file encryption service to protect pupil data in e-mails and file transfers
Remote key for intelligent locking
CLIQ remote from ASSA provides accessible key control access management without disruption to existing door hardware
App for iPhone provides surveillance monitoring abilities
The latest generation of iPhones can be used for surveillance monitoring using the MobileCamViewer app from mobiDEOS
Three key IT security focus areas identified
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
Security company makes tendering process carbon neutral
Part of its corporate social responisbility objectives, the new tendering process at Corps Security will have minimal impact on the environment
Student loan agency employs multi factor authentication
A US student loan service provider is using IDPrime .NET from Gemalto for multi-factor authentication to replace passwords
Cloud based digital signing for clinical trials
SureClinical is using nShield hardware security modules from Thales for secure digital signing in clinical trials
BS 8418 revision for detector activated CCTV standard
The British Standards Institute releases the latest version of BS 8418 covering the installation and remote monitoring of detector activated surveillance systems
VMS partnership symposium held in Las Vegas
A symposium held by Milestone System has brought its global partners together to share their experiences in delivering advanced surveillance systems to key customers
On-demand web penetration testing available to security suppliers
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
More models added to network camera range
Featuring advanced lens technology, the new Canon surveillance camera range features new dome, box and 360 degree cameras
Centralised e-mail encryption
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
The most dangerous IT threats of the year and how to neutralise them
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
Host service provider strategies to defend against DDoS attacks
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
Preventable software failures plagued 2014
SQS reviews 2014 with a list of the top software failures of the year and their impact, including the infamous Heartbleed bug
Hardware security modules provide clinical trial security
Digital signing of documents associated with clinical trials is being protected with the use of nShield hardware security modules from Thales E-Security
Open Video Management System certification for surveillance storage system
Milestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series for video surveillance systems
Video analytics for automatic intruder detection
Partnership between Stanley Security and Digital Barriers brings added automation to intruder detection with the use of video analytics on Axis camera equipment
Cloud based mobile access partnership
MeaWallet is partnering with Safe4 Security Group to bring cloud based mobile access control products and services to the Nordic Market
Using surveillance systems for added business value
As some predict the end of an era for CCTV, Samsung Techwin believes the future lies in private sector surveillance systems adding greater business value
Anthem attack demonstrates need for more than static defence
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks
Study charts enterprise cloud usage risks
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
Electronic information management standard revision
The British Standards Institution has revised BS 10008 for electronic information management with guidance on information storage and transfer
Threat of increased untrusted certificate use
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software
Managed certification for M2M devices
Verizon is entering the Internet-of-Things with its managed certification services for the verification of machine identities
High security locks meet loss prevention standard
Surface mounted multipoint high security locking systems from Pickersgill-Kaye have been awarded with approvals to the LPS 1175 loss prevention standard
SMS access control system protects US food plant
A food manufacturing facility in the USA is protecting zone access and achieving food safety regulation compliance with the help of access control technology from Vanderbilt
Changing face of secure identity in 2015
HID Global examines recent trends to predict how secure identification will develop within the coming year
Key management system installed at Twickenham Stadium
Rugby venue, Twickenham, is improving security ahead of the Rugby World Cup with the installation of key management from Traka
Social media security compliance for business networking site
Business social media networking site, LinkedIn has chosen Proofpoint to become a certified compliance partner for the protection of branded accounts
Information security training courses for the Nordic region
SANS Institute is providing training courses for IT security professionals during March in the Scandinavian area
To stay safe from cybercrime small firms need to stop thinking like consumers
Kaspersky Lab examines the cyber security dilemma of smaller companies and shows how they need to start emulating larger firms in their approach to data security
Reducing Cyber Risk with Trustworthy Best Practices
Ed Paradise, Vice President of Engineering at Cisco explains industry best practice for cyber risk reduction
Battery condition monitoring for fire alarms
Dycon is meeting FIA guidelines with intelligent battery monitoring for fire alarm system monitoring
Surveillance event attended by rail professionals
Samsung Techwin has been demonstrating its PADS approved platform surveillance technology to railway professionals in the UK
Key fob alarm for lone workers
Guardian24 has launched an exclusive new multi-technology personal safety alarm, the MicroGuard.
PSIM integration certification
The IPSecurityCenter Physical Security Information Management software has been certified for integration with Lenal products under the company's OpenAccess Alliance Programme
Standard development for alarm receiving centres
Euralarm is contributing to the development of new standards to cover the expanded communications technologies applicable to monitoring and alarm receiving centres
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo