Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
CERT

The Computer Emergency Response Team was originally set up by Carnegie Mellon University in the late 1980s in response to the first widespread infection of computers by malicious software. With Government funding, CERT was set up to counter future problems of this nature. Since then, many commercial companies have been established to counter the threat of malicious code but CERT still operates as a centre of research and expertise and its role has expanded to encompass all aspects of computer and network security.

Things to consider when adopting an IoT strategy
Mark Lee of Intamac explains the considerations that need to be taken into account when executing a strategy involving the internet of things
Free software update provides on-camera analytics
Mobotix single lens camera owners can now benefit from free software distribution that enables certain limited video analytics to be performed
Security company acquires anti-piracy vessel
Enhanced security now available to companies requiring protection from attacks by pirates off the coast of West Africa
Hardware encrypted USB 3.0 hard drive
Imation is now offering FIPS 140-2 Level 3 certified 256-bit hardware encryption on a USB 3.0 high capacity hard drive for secure storage
Critical infrastructure protection education initiative
Kaspersky Lab joins automation body to help raise awareness of cyber threats in industrial automation environments
Cloud based real time content filtering
Bloxx is now offering its real time web content filtering products off the premises with Tru-View Cloud
Tokenization for protection of cloud data
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud
Confidential e-mail encryption
A belt and braces approach to secure e-mail with both password and certificate based encryption
Key management improves security at Coventry University
The University at Coventry is implementing its contractor control policy with the help of the Traka key management system
Security appliance for industrial control systems
Check Point is now providing SCADA security with its new 1200R appliance that provides protection to industrial control systems from cyber attacks
Escape hoods available for industrial use
Respiratory protect system specialist is now providing small sized protective escape hoods for use in military, law enforcement and private sector security applications
Cloud based interactive application security testing
Partnership between Veracode and Contrast Security brings interactive application security testing into the cloud as an automated service
Considerations for taking out cyber insurance
Charles Sweeney, CEO of Bloxx, examines the case for commercial cyber liability insurance and what steps companies can take to reduce risk and premiums
Access control integration with VMS
Bosch Access Control is now integrated with the Milestone XProtect video management system
Smart city vision incorporates security and resilience
Euralarm reports on its appearance at an Athens Smart City conference where it provided delegates of its vision of security and resilience in the cities of the future
Secure storage ready for Windows 10
Windows 10 ready IronKey devices can now be configured and integrated in batches for easier deployment for secure enterprise storage
Burnley football club improves security with IP video surveillance
Axis Communications has supplied IP video surveillance technology to improve security and safety at the Turf Moor Stadium of Burnley Football Club
June health and safety event to feature lone worker alarm
The latest MySOS personal safety alarm will feature at the Safety and Health Expo taking place in London during June
Video analytics provide security for banking transactions
Searchlight for Banking from March Networks provides video based intelligence through analytics processing for the banking and finance industry
Special US cyber security legislation support
IT security industry body ISACA has released a special report which examines the latest cybersecurity legislation on information sharing in the USA
Improved access control for Irish mobile base stations
The access control infrastructure at ESB Telecoms in Ireland is being upgraded by Locken at GSM base stations throughout the country
Certified eLearning security course competition
Octavian Security is offering 10 eLearning courses in a competition to celebrate World Health and Safety Day
Long range identification ANPR
Nortech is supplying Nedao's ANPR access HD system for supporting long range vehicle identification in the UK
Video door entry for South London luxury flats
Urmet has supplied London property developer with IP video door entry equipment to secure access to a new block of luxury flats
Apprentice security installer awards open
The British Security Industry Association has opened its 2015 award competition for the best apprentice security installer
Research reveals continued risk from heartbleed
Incomplete remediation from heartbleed leaves UK companies at risk a year after the vulnerability was first recognised
Improved network visibility and security at Norwich School
ForeScout CounterACT is providing the independent Norwich School with network visibility, regulatory compliance and potential breach mitigation
Retrofit door handles for easy security upgrades
The Retro3 door closures from Union can directly replace Briton 2004 equipment whilst maintaining fire integrity
Tackling Today’s Authentication Complexities
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
Payment card industry compliance consultancy available
Foregenix is offering a free service to provide consultancy on meeting Payment Card Industry standard compliance
Video management integration with ANPR
Viper licence plate recognition software integrated with the exacqVision video management system from Exacq Technologies
Increase in cyber attacks affects all sizes of companies
Darren Anstee, Director of Solutions Architects at Arbor Networks puts perspective on the cyber security landscape and shows it isn't just large companies that are at risk
Insecure personal data on wearable technology
Kaspersky Lab discovers security flaws exposing personal data to risk when using wearable technology for fitness assessment
Call for cloud-based digital signature recognition in EU standards
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate
Secure Email and FTP protects sensitive pupil data
Primary school in London borough of Ealing adopts e-mail and file encryption service to protect pupil data in e-mails and file transfers
Remote key for intelligent locking
CLIQ remote from ASSA provides accessible key control access management without disruption to existing door hardware
App for iPhone provides surveillance monitoring abilities
The latest generation of iPhones can be used for surveillance monitoring using the MobileCamViewer app from mobiDEOS
Three key IT security focus areas identified
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
Security company makes tendering process carbon neutral
Part of its corporate social responisbility objectives, the new tendering process at Corps Security will have minimal impact on the environment
Student loan agency employs multi factor authentication
A US student loan service provider is using IDPrime .NET from Gemalto for multi-factor authentication to replace passwords
Cloud based digital signing for clinical trials
SureClinical is using nShield hardware security modules from Thales for secure digital signing in clinical trials
BS 8418 revision for detector activated CCTV standard
The British Standards Institute releases the latest version of BS 8418 covering the installation and remote monitoring of detector activated surveillance systems
VMS partnership symposium held in Las Vegas
A symposium held by Milestone System has brought its global partners together to share their experiences in delivering advanced surveillance systems to key customers
On-demand web penetration testing available to security suppliers
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
More models added to network camera range
Featuring advanced lens technology, the new Canon surveillance camera range features new dome, box and 360 degree cameras
Centralised e-mail encryption
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
The most dangerous IT threats of the year and how to neutralise them
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
Host service provider strategies to defend against DDoS attacks
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
Preventable software failures plagued 2014
SQS reviews 2014 with a list of the top software failures of the year and their impact, including the infamous Heartbleed bug
Hardware security modules provide clinical trial security
Digital signing of documents associated with clinical trials is being protected with the use of nShield hardware security modules from Thales E-Security
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo