Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
POC
Proof Of Concept is a widely used term to describe the feasibility of an idea. In the field of IT security, a POC is a simulation of the effect of malicious software or the principle of a security solution. The POC approach is something that is becoming more familiar as malicious software is becoming more difficult to intercept especially at the early stages before a patch has been written. Anti-virus software is now generally made up of many components that act in different ways to provide a multiple approach to detecting viruses. With such an approach, traditional testing methods are less effective and so a POC approach is adopted as a more effective alternative.
Wireless digital access with lockdown
Alarm Lock has released a keyless digital access system with lock down function for use in schools and other educational establishments
Advice on choosing the right encryption
ESET examines the complex world of encryption and provides a few tips on how to choose the correct products for different needs
USB memory devices left at dry cleaners often never returned
A survey from ESET amongst dry cleaners uncovered the proportion of USB memory sticks and mobile phones that are left in pockets and never get claimed
Key management prevents theft at crane supplier
UK crane supplier chooses key cabinet system from Traka after trial installation that helped to prevent a theft at the company
Video door entry system for London stadium development
Art Deco former greyhound racing track in Walthamstow gains state of the art video door entry for access control to new residential development
August 2015 threat report available
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years.
Biometrics facilitate remote identification in Pinellas County
Local police in Pinellas County now have mobile access to fingerprint records enabling biometric finger identification whilst in the field
New malware bypasses CAPTCHA
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money
Intelligent protection combats grey route mobile messaging
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
Partnership enables video intelligence sharing on secure cloud platform
Facewatch and Cloudview have collaborated on a crime reporting and video intelligence platform in the cloud for providing evidence of crime to police forces
2015 to see further evolution of DDoS attacks
Corero Networks predicts the IT security landscape for 2015, forecasting more sophistication in DDoS attacks and the rise of Internet-of-Things threats
Data recovery expert lists some of the lighter duties performed this year
From dog-chewed USB sticks to drenched smartphones and an aggressive laptop user, Kroll Ontrack has helped them all recover data in 2014
Security company director jailed
Secure Serve director faces 18 months in jail after being handed a custodial sentence for failing to pay back the proceeds from crime
Plugins continue to result in security flaws for WordPress
Popular Content Management Systems like WordPress continue to suffer from security flaws as a result of poorly structured plugins and extensions
Large retail chain deploys two factor authentication for network access
Middle East based LuLu Group is controlling access to its networks for over 30,000 employees using tokenless two-factor authentication from SecurEnvoy
Fast video search facility for people tracking
Identifying and tracking people on surveillance systems is now made easier on a Nice video analytics systems that cuts down video search times
How to keep contactless payment credentials secure
Bitdefender explains the top security threats associated with the booming contactless payment industry with monthly spending now three times that of last year
The future of mobile forensics in global legal systems
Yuval Ben-Moshe of Cellebrite explains the necessity for accommodating mobile forensics technology as part of the legal process
Highly secure USB flash storage for personal data protection
The datAshur Personal flash drive from iStorage has been launched as an ultra-secure but affordable personal data storage device
Safe mobile connectivity in an age of industrialized hacking
Cisco Security Strategist, Sean Newman, discusses the increased use of employee-owned devices and how to stay safe during a corresponding increase in mobile malware
Cambridge sixth form college installs BYOD programme to increase network security
Long Road Sixth Form College in Cambridge, England, has selected ForeScout CounterACT to ease the roll-out of its bring your own device (BYOD) program by providing real-time visibility of what is connected to the network: devices - personal and mobile, applications and users. These factors, combined
Toughpad tablets gain MOD standard encryption
Becrypt has worked with Panasonic to provide encryption to the requirements of the UK MoD for use in the Toughpad tablet computer
Fraud detection market research
Report forecasts the market for fraud detection and prevention products worldwide until 2018
Twelve scams to watch out for this Christmas
McAfee details the 12 main scams doing the rounds this Christmas and offers advice on how to avoid becoming the victim of fraud
Security to go through evolutionary step in 2014
Tim Keanini of Lancope provides his predictions for the IT security environment that he expects to emerge during 2014
Time controlled biometric access for hotel rooms
Fingerprint biometric technology has enabled the next step to be taken in hotel access control with a time-based keyless access system for hotel guests
Advice for staying safe from online fraud
During Safe Online Week, certification authority GlobalSign is providing consumers with useful advice on protecting themselves from online fraud
Advice on protecting company information for travelling workers
Iron Mountain has provided some advice for people who work while using public transport on how to protect sensitive information from commuter snoopers
ANPR software for retrospective crime detection
CitySync Safety is helping police to convict criminals who use cars in their crimes by analysing licence plate recognition data and matching it to crime scenes
Pair fined over false ACS membership claims
Lidl security contractors convicted of making false Approved Contractor Scheme membership in order to gain lucrative security contract
Doing Business in Russia & CIS
Groteck Business Media has started a series of workshops devoted to the subject "Doing business in Russia and CIS. The first seminar of the series covered "How to develop Russian & CIS security markets" and took place on 25th July 2013 in The Grand Victoria Hotel, Taipei City.


Bravery recognition for G4S employees
The British Security Industry Association has recognised six employees of G4S for their braver, dedication and commitment to innovation
BSIA publishes guide to stolen goods recognition
New guide is aimed at jewellers and pawnbrokers to reduce their risk of prosecution for handling stolen goods
Holographic protection could stem tide of counterfeit goods from China
The International Hologram Manufacturers Association comments on a UN report identifying China as the source of three-quarters of all counterfeit goods
ISACA identifies key IT trends of 2013
Looking to the year ahead, ISACA identifies certain aspects of IT security that will have the greatest impact on organizations
BYOD security tops Avecto list of 2013 IT trends
Avecto has provided its list of the top 5 trends in IT security for 2013 including Windows 8 issues and Bring-Your-Own-Device (BYOD)
SIA runs audit on London nightlife security
Security operators in London were recently paid a visit by the Security Industry Authority searching for illegal operators
Salami attacks predicted to increase as an IT threat
Dubbed Salami attacks, composite threats of small attacks combining to create something larger are predicted to grow by Varonis
Fuel thieves foiled with beam detectors
A combination of beam detectors and security guards with dogs managed to catch fuel thieves from a flooring preparation contractor in the UK
US Government cyber attack demands tighter access control
SecurEnvoy comments on increasing occurrences of cyber attacks on state government creating greater need for two-factor authentication of access credentials
Smartphone Loss and Theft Prevention Hardware
The iKeep loss prevention cord and clip keeps iPhone and iPad systems safe from inadvertant loss or from theft
CCTV Surveillance Provide Crowd Control At Tall Ships Festival
The Dublin tall ships festival was kept safe and secure during August through a CCTV surveillance system for controlling crowds supplied by Samsung Techwin
Smiths Enters Radiation Detection Partnership
Agreement with Mirion opens US military, aviation and homeland security markets for radiation detection instruments to Smiths Detection
Mobile Security Confusing Business Leaders in UK and USA
Research by Tenable Networks shows contradictory but equally confused responses concerning dealing with threats posed by the use of mobile devices in the workplace
Security Issues Highlighted on Gateway Services
SecurEnvoy links closure of API-based access to Google platform on security issues which are solvable with 2FA
Biometric Smartphone App For Police Patrols
The iBolo biometric device from Fulcrum is a pocket fingerprint application for use by police in the field
Single Sign-on Flaws Drives Need For 2FA
Two-Factor Authentication or 2FA falls under the spotlight as US researchers discover pitfalls in single sign-on services
Using QR Codes For Malicious Purposes
Check Point provides some background on emerging Quick Response codes and how they can be used to exploit browser curiosity and lead them to exploit sites
SMS Authentication Provides Green Alternative To Physical Tokens
SecurEnvoy provides an opinion on the widespread deployment by banks of physical tokens at high environmental cost when compared to the use of SMS based authentication technology
Terrorism Hacking Link Steps Up IT Security Alert
Lieberman Software comments on the link between hacking at AT&T and an act of terrorism, believing that such links provide the incentive to step up levels of action to prevent data base hacking
First | Prev  | 1 | 2 | 3 | 4 | 5  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo