Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Cloud security report for 2015
Cloud Computing Security : 07 October, 2015
Application attacks increase against cloud deployments according to the Autumn 2015 cloud security report from Alert Logic
High performance next generation firewall
Network Security, Routers and Data Centres : 07 October, 2015
The W50 next generation firewall from Clavister provides the flexibility and performance needed to fulfil the requirements of highly demanding data centre environments
Credential access protection for smart meters
Authentication : 29 September, 2015
Smart metering systems from ADD are now given additional protection with Thales KeyAuthority for cryptographic key management
Threat sharing attitudes for life critical applications revealed
Data Protection : 29 September, 2015
Survey conducted by AlienVault demonstrates the shift in public opinion concerning the disclosure of threat information for life threatening circumstances
Cyber essentials certification for Intel Security
Data Protection : 29 September, 2015
Intel Security gains UK Government certification against its Cyber Essentials Scheme
High demand for security integration as endpoints proliferate
Network Security, Routers and Data Centres : 29 September, 2015
ForeScout Technologies shares the results of its CISO survey showing a greater need for integration and automation from their IT security tools
Webinar on changing nature of DDoS attacks
Anti-virus and anti-malware software : 28 September, 2015
Akamai and Bright Talk have produced a webinar which highlights the way in which Distributed Denial of Service attacks have changed
Healthcare industry falls into cyber crime spotlight
Anti-virus and anti-malware software : 28 September, 2015
Websense report examines the vulnerability of the healthcare industry to cyber attacks and reveals startling statistics on the volume of security incidents
Data encryption company acquisition
Data encryption : 28 September, 2015
ESET has bought out data encryption company DESlock+ to provide encryption based products as part of its range
Handling end user privacy expectations
Data Protection : 28 September, 2015
Agathe Caffier, Senior Counsel of International Operations & Privacy Specialist at DMI explains privace expectations of users and how best to handle them in policies and software design
Increasing interest in secure portable storage devices
Data Protection : 25 September, 2015
With Windows to Go on board, the IronKey bootable USB device is seeing increasing popularity as an alternative to equipping employees with laptops
Delivery of malware through advertising
Anti-virus and anti-malware software : 25 September, 2015
Eric Rand, security consultant at AlienVault explains how malware is delivered through advertising and whether adblocking is an ethical approach
The anatomy of application layer DDoS Attacks
Anti-virus and anti-malware software : 23 September, 2015
Rishi Agarwal of NSFocus explains Layer 7 or application layer DDoS attacks and the approach needed to secure against them
Printers with built-in security protection
Data Protection : 23 September, 2015
The latest generation of laser printers from HP have security features built into them with BIOS protection
Privileged access management now supports latest Microsoft products
Authentication : 21 September, 2015
Microsoft Azure SQL and SQL Server 2016 are now supported by the latest version of Enterprise Random Password Manager
CoinVault arrests made in Holland
Anti-virus and anti-malware software : 21 September, 2015
Kaspersky Lab plays crucial role in apprehension of two criminals associated with the CoinVault ransomware attacks
EU data regulation preparations
Data Protection : 21 September, 2015
Rob Norris, Director of Enterprise and Cyber Security for UK and Ireland at Fujitsu discusses the development of cyber resilience required by companies to meet the 2017 requirements of the new EU data regulations
Machine learning keeps zero-day malware at bay
Anti-virus and anti-malware software : 14 September, 2015
Bitdefender has deployed machine learning technology in its consumer product range to capture malware within milliseconds
Protection against web application user account attacks
Anti-virus and anti-malware software : 14 September, 2015
SecureSphere 11.5 brings cloud and on-premises data centre protection through blocking attacks aimed at compromising user accounts
Using rights management for cloud data security
Software Rights Management : 10 September, 2015
James Butler of Trustmarque discusses the use of Rights Management tools for providing data security in cloud and BYOD environments
Rugged secure USB workspace
Data Protection : 10 September, 2015
The W200 from Imation is the latest IronKey with Windows-to-go embedded to provide portable workspace security
Private cloud security for German church
Cloud Computing Security : 10 September, 2015
A church in southern Germany is gaining the benefits of private cloud technology with security through appliances from Clavister
Secure tamper proof USB 3.0 flash drive
Data Protection : 10 September, 2015
Secure flash drive from iStorage for the storage of sensitive data is accredited to FIPS 140-2 level 3.
Untrustworthy certificate authority survey results
Data Protection : 10 September, 2015
Venafi releases its survey results into vulnerability remediation for untrustworthy CAs amongst security professionals at Black Hat USA
Breach level index report for 1H2015
Data Protection : 09 September, 2015
Gemalto releases its latest Breach Level Index report covering data breaches globally in the first half of 2015
Additional security controls in user access management software
Authentication : 09 September, 2015
PowerBroker Password Safe uses workflow context to reduce risk from insider threats
Protecting against non-malware breaches
Authentication : 07 September, 2015
Dell SecureWorks provides advice on avoiding security breaches that make use of the company credentialling system without the use of malware
Payment service XSS vulnerability discovered
Anti-virus and anti-malware software : 07 September, 2015
Bitdefender details its latest discover, this time of a stored XSS vulnerability which could affect payment service users
Security conference sees new product launches
Data Protection : 07 September, 2015
HP has released a number of new data security and compliance related products at its HP Protect conference for security professionals
Intelligent approach to change detection
Data Protection : 03 September, 2015
Latest version of NNT Change Tracker provides more intelligence in system integrity monitoring and change tracking to prevent security breaches
IT security analytics products released at conference
Data Protection : 03 September, 2015
HP has released new products at the HP Protect event focused on shifting the emphasis of IT security towards an analytics approach
Secure data centre for Belgian Bank
Network Security, Routers and Data Centres : 03 September, 2015
Delen Private Bank in Belgium has chosen ICTroom to supply its secure corporate data centre in Antwerp
Online identity risks overwhelm UK consumers
Data Protection : 03 September, 2015
Study from Kaspersky Lab reveals privacy paralysis in the UK with consumers feeling overwhelmed with IT security risks
Channel Reseller News recognition for ForeScout CEO
Network Security, Routers and Data Centres : 03 September, 2015
Mike DeCesare named in top 100 executive list in Channel Reseller News rankings for 2015
Media players vulnerable to arbitrary code execution
Anti-virus and anti-malware software : 01 September, 2015
Bitdefender is warning of a vulnerability in JetAudio Basic and JetVideo media players that could result in remote code execution by attackers
Security breach impact on virtual infrastructure
Data Protection : 01 September, 2015
Report shows companies running virtual infrastructures suffer higher costs resulting from security breaches
File sharing security for logistics company
Network Security, Routers and Data Centres : 01 September, 2015
Varonis has provided a German logistics company with DatAdvantage to manage file permissions and security groups
August 2015 threat report available
Anti-virus and anti-malware software : 01 September, 2015
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years.
Young people lack trust in digital security
Data Protection : 27 August, 2015
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity
Agentless protection for Windows 10 BYOD devices
Network Security, Routers and Data Centres : 27 August, 2015
CounterACT provides security professionals with the tools needed to cope with the deluge of Windows 10 BYOD device network connections
Survey shows increase in targeted attacks
Data Protection : 19 August, 2015
A survey conducted by Tripwire at Black Hat USA gauges the feelings of IT security professionals on the potential for nation-state cyber attacks
SMS based 2FA password reset service
Authentication : 19 August, 2015
Identity management service provider chooses SMS PASSCODE for performing password reset functions using two factor authentication to reduce help desk burden
Partnership for mobile wallet payments
Finance and Banking Security : 18 August, 2015
MeaWallet has gone into partnership to provide cloud based mobile payments for EMV card holders
Endpoint security software for businesses running Macs
Anti-virus and anti-malware software : 18 August, 2015
The Endpoint Security for Mac product from Kaspersky lab provides single console management for Mac oriented businesses
The silent approach of advanced persistent threats
Data Protection : 17 August, 2015
High Tech Bridge explains how easily advanced persistent threats infiltrate the IT network of an organisation exposing vulnerabilities
Multiple mac device security
Anti-virus and anti-malware software : 17 August, 2015
Flextivity 1.5 provides cloud based security and monitoring for small businesses operating Mac equipment
Business centre operator upgrades firewalls
Network Security, Routers and Data Centres : 14 August, 2015
Network infrastructure at Regus has been improved with next generation firewalls for secure remote access
Fake Windows 10 upgrade hides ransomware
Anti-virus and anti-malware software : 10 August, 2015
Bitdefender issues warning of ransonware spread through fake e-mails which solicit users to upgrade to latest Windows operating system
Mobile threat protection for iOS and Android
Mobile computing security : 10 August, 2015
Users of Android and Apple mobile devices now have access to mobile security software for threat detection and resolution
Stopping the insider threat
Data Protection : 10 August, 2015
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo