Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Change tracking for PCI DSS Compliance
Software Asset Management and Compliance : 26 March, 2015
US IT company chooses to supply its customers with Change Tracker Enterprise from NNT for improving compliance to PCI DSS standards
 
Call for cloud-based digital signature recognition in EU standards
Data Protection : 26 March, 2015
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate
 
Matching security to increased network performance
Network Security, Routers and Data Centres : 26 March, 2015
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems
 
Secure Email and FTP protects sensitive pupil data
Data encryption : 23 March, 2015
Primary school in London borough of Ealing adopts e-mail and file encryption service to protect pupil data in e-mails and file transfers
 
Financial services compliance expansion
Software Asset Management and Compliance : 20 March, 2015
Additional functions available on Proofpoint Enterprise Archive for improving compliance of financial services companies to regulatory requirements
 
Insider threat protection to increase during 2015
Data Protection : 20 March, 2015
Research from IS Decisions shows that existing levels of just of 40 percent for insider threat protection will increase within the UK during this year
 
Three key IT security focus areas identified
Data Protection : 19 March, 2015
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
 
Hardware encrypted USB storage with PIN access
Data encryption : 19 March, 2015
Solid state secure memory device with hardware encryption from iStorage is available with PIN based access control
 
Virtualised cloud communication security
Cloud Computing Security : 18 March, 2015
The virtualised real-time communications system from Sonus Networks brings enhanced security and intelligence
 
Cloud based digital signing for clinical trials
Authentication : 12 March, 2015
SureClinical is using nShield hardware security modules from Thales for secure digital signing in clinical trials
 
Secure data on the move for TfL using hardware encrypted flash memory
Data encryption : 12 March, 2015
Hardware encrypted secure USB storage devices by iStorage are being used by Transport for London to help prevent loss of mobile data
 
Unified Security Management for card payment system provider
Data Protection : 12 March, 2015
Crosskey has chosen Unified Security Management from AlienVault for increased security visibility in its card payment processing operations
 
Student loan agency employs multi factor authentication
Authentication : 12 March, 2015
A US student loan service provider is using IDPrime .NET from Gemalto for multi-factor authentication to replace passwords
 
Security-as-a-Service firewall available in Holland
Network Security, Routers and Data Centres : 11 March, 2015
Clavister partners in Holland are now able to offer the company's Security-as-a-service firewall for managed security service providers
 
Proactive document threat detection
Anti-virus and anti-malware software : 11 March, 2015
Check Point Threat Extraction takes a new approach to eliminating the threats posed by infected documents
 
New malware bypasses CAPTCHA
Anti-virus and anti-malware software : 11 March, 2015
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money
 
New wave of Cryptowall ransomware attacks
Anti-virus and anti-malware software : 10 March, 2015
Bitdefender uncovers new distribution mechanism for the Cryptowall ransomware through spam campaign
 
Natural language processing for preventing spear phishing
Anti-virus and anti-malware software : 10 March, 2015
OpenDNS develops new model of making real-time detections of targetted phishing campaigns using natural language processing
 
Key actions needed to ensure digital safety
Data Protection : 10 March, 2015
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe
 
On-demand web penetration testing available to security suppliers
Internet Security and Content Filtering : 06 March, 2015
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
 
Console provides real time social media threat information
Data Protection : 06 March, 2015
Proofpoint is now supplying its Nexgate Social Threat Centre, a console for providing administrators with up to date information on social media threats
 
End to end control for real time communications networks
Network Security, Routers and Data Centres : 05 March, 2015
Sonus IQ has been released to provide real time communications network operators with a security and intelligence platform
 
Mobile security for wearable technology
Mobile computing security : 05 March, 2015
LG Electronics is making use of mobile access control from baimos technologies for its latest wearable devices
 
Centralised e-mail encryption
Data encryption : 05 March, 2015
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
 
Poor management of social messaging and file sharing in business
Data Protection : 05 March, 2015
A study undertaken by Iron Mountain shows an alarmingly low level of management of third party file-sharing systems and social messaging in the enterprise
 
Multi-factor authentication for wearable technology
Authentication : 04 March, 2015
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
 
Intelligent protection combats grey route mobile messaging
Mobile computing security : 04 March, 2015
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
 
Big data analytics provide network investment decision support
Network Security, Routers and Data Centres : 04 March, 2015
CommsReveal from BAE Systems is designed to provide network intelligence through big data analytics to communications service providers to enable decisions to be made on investments and network changes
 
Collaboration extends NFC adoption opportunities
Mobile computing security : 04 March, 2015
Virtual access, ID and other card system implementations have been simplified through a technology collaboration between NXP Semiconductors and MeaWallet
 
The most dangerous IT threats of the year and how to neutralise them
Network Security, Routers and Data Centres : 02 March, 2015
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
 
IT security and the Internet of Things
Anti-virus and anti-malware software : 02 March, 2015
Luis Corrons of Panda Security explains how the Internet of Things provides new opportunities for cyber criminals in an increasingly connected world
 
Cloud based real time communications demonstration at MWC
Cloud Computing Security : 02 March, 2015
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
 
Third party loophole behind TalkTalk breach
Data Protection : 02 March, 2015
LogRhythm discusses the need for controlling third-party organisation IT security to reduce the threat of corporate data breaches
 
New CEO appointed at ForeScout Technologies
Network Security, Routers and Data Centres : 02 March, 2015
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer
 
Award recognition for ForeScout channel partner
Network Security, Routers and Data Centres : 27 February, 2015
High revenue growth rates in 2014 for enterprise sales has earned the 2014 ForeScout EMEA Channel Partner Award for NTT Com Security
 
Research published on Security-as-a-Service for communication service providers
Network Security, Routers and Data Centres : 27 February, 2015
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
 
Aggressive adware still being seen in Android apps
Mobile computing security : 27 February, 2015
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender
 
Preventable software failures plagued 2014
Data Protection : 25 February, 2015
SQS reviews 2014 with a list of the top software failures of the year and their impact, including the infamous Heartbleed bug
 
Host service provider strategies to defend against DDoS attacks
Anti-virus and anti-malware software : 25 February, 2015
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
 
Comprehensive security for mobile operator signalling infrastructure
Network Security, Routers and Data Centres : 25 February, 2015
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks
 
Lessons learned from web mobile application vulnerabilities
Data Protection : 23 February, 2015
Adrian Beck of Veracode looks back at some of the main data breach incidents of 2014 and explains what could be done to prevent them
 
Device timer regulates offline use of endpoints
Network Security, Routers and Data Centres : 19 February, 2015
Absolute Computrace enables network administrators to set offline usage policies with a trace and freeze options for endpoints
 
Hardware encrypted flash drives now available as USB 3.0 devices
Data Protection : 19 February, 2015
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity
 
Eight reasons to deploy multi-factor authentication
Authentication : 19 February, 2015
David Hald of SMS Passcode provide compelling reasons why Multi-Factor Authentication should be implemented for greater security
 
Pre-infection threat detection acquisition
Anti-virus and anti-malware software : 19 February, 2015
Check Point goes to the next step of threat detection with the acquisition of a company which provides CPU-level malware prevention technology
 
Five steps to secure iterative software delivery
Data Protection : 18 February, 2015
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
 
Cloud service for using Android trusted environment
Mobile computing security : 18 February, 2015
Android app developers requiring data protection against malware from other software loaded on devices can now make use of the MyTAM cloud service for employing on-device Trusted Execution Environment
 
Arabic cyber espionage aims at high profile targets in Middle East
Anti-virus and anti-malware software : 18 February, 2015
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region
 
Defending company assets against the latest onslaught of cyber attacks
Data Protection : 18 February, 2015
Kalyan Kumar of HCL Technologies looks at the best defence strategies that organisations can use to protect themselves from increasingly sophisticated and effective cyber threats
 
Hardware security modules provide clinical trial security
Data Protection : 18 February, 2015
Digital signing of documents associated with clinical trials is being protected with the use of nShield hardware security modules from Thales E-Security
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo