Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Considerations for taking out cyber insurance
Internet Security and Content Filtering : 20 May, 2015
Charles Sweeney, CEO of Bloxx, examines the case for commercial cyber liability insurance and what steps companies can take to reduce risk and premiums
 
Android protection for Korean mobile payment specialist
Finance and Banking Security : 20 May, 2015
Intercede has supplied Interpay with the MyTAM platform for providing payment security and malware protection for Android users of the mobile payment system
 
Protection of information from visual hacking
Data Protection : 20 May, 2015
Peter Harley of 3M explains how companies could be losing information through leaving screens exposed to people able to see content over the users shoulder
 
Skill shortage for information management
Data Protection : 20 May, 2015
Survey from Iron Mountain reveals the extent to which business leaders are facing a skills shortage in the UK for critical information management
 
BYOD risks overlooked by smaller businesses
Mobile computing security : 19 May, 2015
Research from Kaspersky Lab shows almost a third of small UK businesses fail to see any threat in employees using their own mobile devices
 
EU General Data Protection Regulation still misunderstood by many
Data Protection : 12 May, 2015
A survey at Counter Terror Expo has revealed the level of misunderstanding that still exists amongst UK businesses of the forthcoming EU General Data Protection Regulations
 
Security seal denotes manually pen tested sites
Internet Security and Content Filtering : 12 May, 2015
Web sites and applications which have been manually penetration tested can now be distinguished from other by the ImmuniWeb Security Seal
 
Key European sales appointments for data centre company
Network Security, Routers and Data Centres : 08 May, 2015
ICTroom hires bolsters European sales growth with two new appointments covering the UK, Ireland and the DACH region
 
Secure storage ready for Windows 10
Data encryption : 08 May, 2015
Windows 10 ready IronKey devices can now be configured and integrated in batches for easier deployment for secure enterprise storage
 
Chief Strategy Officer to lead new phase of growth
Network Security, Routers and Data Centres : 08 May, 2015
Network security company hires Chief Strategy Officer to provide leadership into the next growth stage in line with corporate strategy
 
Cloud authentication using NFC devices
Authentication : 06 May, 2015
ActivID Tap Authentication provides multi-factor credentialling for users of Microsot Office 365 and other cloud apps and services
 
Wristbands enable secure contactless payment
Payment cards and e-commerce security : 06 May, 2015
Rugby Union fans and guests of the Saracens can use contactless payments at their London stadium thanks to the use of secure wristbands
 
Web application scanning acquisition
Internet Security and Content Filtering : 06 May, 2015
Rapid7 takes over NT Objectives bringing latest web application scanning tools into the company portfolio
 
Communication Session Controllers with Skype for Business enabled
Network Security, Routers and Data Centres : 06 May, 2015
Sonus software upgrades for real time IP communications now enable Skype for Business to be used
 
ForeScout joins Society of IT Management as silver partner
Network Security, Routers and Data Centres : 06 May, 2015
Public sector IT management group welcomes ForeScout Technologies to its membership for delivery of IT and digitally enabloed services for the public benefit in the UK
 
Small office IT security without the need for IT skills
Anti-virus and anti-malware software : 04 May, 2015
Kaspersky Lab is meeting the needs of smaller businesses with a special edition of Small Office Security that can be commissioned without specialist IT skills
 
Hardware encrypted USB storage with ePO support
Data encryption : 30 April, 2015
The latest IronKey hardware encrypted USB storage devices from Imation are compatible with McAfee's ePolicy Orchestrator platform
 
Insecure boardroom practices put UK companies at risk
Data Protection : 28 April, 2015
Outdated paper based information distribution and use of most insecure mobile platform categorize two elements of serious data risks faced by UK boardrooms
 
High performance Unified Threat Management
Unified Threat Management : 28 April, 2015
Panda Security has released two new Unified Threat Management appliances offering greater performance in data protection
 
Poor threat intelligence creating network and data exposures
Data Protection : 27 April, 2015
In its latest threat brief, Webroot shows the extent to which poor threat intelligence is leaving greater exposures to increased complexity of cybercrime
 
Fireware operating system fights cyberloafing
Internet Security and Content Filtering : 27 April, 2015
A new operating system from WatchGuard Technologies is aimed at helping companies regain productivity by reducing the time employees spend surfing the internet
 
Security partnerships improve threat response capabilities
Network Security, Routers and Data Centres : 27 April, 2015
Parnership expansions based on ForeScout ControlFabric bolster mitigation capabilities for advanced threats and breaches.
 
Encryption and Key Management trend survey results
Data encryption : 22 April, 2015
Thales and the Ponemon Institute have completed their study on global encryption trends and the use of key management
 
Cloud based privileged identity management service
Authentication : 22 April, 2015
Managing priviliged identities in the cloud is now possible with the release of a new service for hybrid on-premises and cloud-based systems
 
Vulnerability discovery in e-commerce platform
Anti-virus and anti-malware software : 22 April, 2015
Check Point discovers vulnerability affecting a popular web e-commerce platform used by online auction site
 
Intruder analytics integration with Office
Data Protection : 22 April, 2015
Users of Microsoft Office 365 can now gain additional protection with the ability to identify and investigate intruders with behaviour analytics
 
Visualisations demonstrate sophistication of banking scams
Finance and Banking Security : 22 April, 2015
AdaptiveMobile is attending the US RSA conference with demonstrations of how mobile banking attacks can have devastating effects on the US financial system
 
Mobile device use increases at Transport for London
Mobile computing security : 20 April, 2015
London transport provider almost doubles its use of mobile tablet devices over the last two years to streamline activities
 
New leadership for web security company
Internet Security and Content Filtering : 15 April, 2015
Industry expert with 20 years experience joins web security company, WhiteHat Security as its new Chief Executive
 
International consortium disrupts major botnet
Anti-virus and anti-malware software : 15 April, 2015
A group of IT companies led by the Interpol police service have successfully brought down the Simda botnet linking computers globally
 
NFC based authentication could see an end to passwords
Authentication : 14 April, 2015
SecurEnvoy is using the RSA Conference to demonstrate its prototype of single swipe authentication for Windows 10 using Near Field Communication
 
Secure USB promotion marks device landmark
Data Protection : 14 April, 2015
Imation is introducing a Golden IronKey programme to celebrate selling over two million secure USB memory drives
 
Public sector network computing award
Network Security, Routers and Data Centres : 14 April, 2015
ForeScout Technologies gains network computing award success in recognition for project at Sutton and East Surrey Water
 
Research reveals continued risk from heartbleed
Anti-virus and anti-malware software : 08 April, 2015
Incomplete remediation from heartbleed leaves UK companies at risk a year after the vulnerability was first recognised
 
Security management for Amazon Web Services
Unified Threat Management : 08 April, 2015
Unified Security Management released to provide security controls and threat intelligence for users of Amazon Web Services
 
Cloud security platform enhanced by technology acquisition
Cloud Computing Security : 08 April, 2015
CipherCloud has acquired cloud security analytics technology to enhance its enterprise cloud security platform
 
Tackling Today’s Authentication Complexities
Authentication : 07 April, 2015
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
 
Improved network visibility and security at Norwich School
: 07 April, 2015
ForeScout CounterACT is providing the independent Norwich School with network visibility, regulatory compliance and potential breach mitigation
 
IT security company evolution
Anti-virus and anti-malware software : 02 April, 2015
Kirill Slavin, General Manager, Kaspersky Lab UK and Ireland, explains Why diversify or die doesn’t always ring true in an ever-evolving IT security market place
 
Payment card industry compliance consultancy available
Software Asset Management and Compliance : 02 April, 2015
Foregenix is offering a free service to provide consultancy on meeting Payment Card Industry standard compliance
 
Insecure personal data on wearable technology
Mobile computing security : 01 April, 2015
Kaspersky Lab discovers security flaws exposing personal data to risk when using wearable technology for fitness assessment
 
Increase in cyber attacks affects all sizes of companies
Data Protection : 01 April, 2015
Darren Anstee, Director of Solutions Architects at Arbor Networks puts perspective on the cyber security landscape and shows it isn't just large companies that are at risk
 
Change tracking for PCI DSS Compliance
Software Asset Management and Compliance : 26 March, 2015
US IT company chooses to supply its customers with Change Tracker Enterprise from NNT for improving compliance to PCI DSS standards
 
Call for cloud-based digital signature recognition in EU standards
Data Protection : 26 March, 2015
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate
 
Matching security to increased network performance
Network Security, Routers and Data Centres : 26 March, 2015
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems
 
Secure Email and FTP protects sensitive pupil data
Data encryption : 23 March, 2015
Primary school in London borough of Ealing adopts e-mail and file encryption service to protect pupil data in e-mails and file transfers
 
Financial services compliance expansion
Software Asset Management and Compliance : 20 March, 2015
Additional functions available on Proofpoint Enterprise Archive for improving compliance of financial services companies to regulatory requirements
 
Insider threat protection to increase during 2015
Data Protection : 20 March, 2015
Research from IS Decisions shows that existing levels of just of 40 percent for insider threat protection will increase within the UK during this year
 
Three key IT security focus areas identified
Data Protection : 19 March, 2015
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
 
Hardware encrypted USB storage with PIN access
Data encryption : 19 March, 2015
Solid state secure memory device with hardware encryption from iStorage is available with PIN based access control
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo