Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Cybercrime predominance in financial theft
Anti-virus and anti-malware software : 23 November, 2015
Kaspersky Lab research into cybercrime in the Russian language reveals nearly all of it relates to the theft of money
CISO panel initiative for expertise sharing
Data Protection : 23 November, 2015
CyberArk initiates a CISO panel for sharing experience and expertise in overcoming the challenges of privileged access control
Holistic threat protection for Wolverhampton College
Anti-virus and anti-malware software : 19 November, 2015
Midlands education centre protects its network with holistic security system incorporating firewall, application controls and anti malware software
Integrated IT security aids Turkish Credit Bureau
Network Security, Routers and Data Centres : 19 November, 2015
ForeScout Technologies chosen by KKB Credit Bureau in Turkey for providing the platform to secure the network and integrate security systems.
Secure mobile payment app
Payment cards and e-commerce security : 13 November, 2015
Swiss company enabling secure mobile payments using smartphones with the help of mIDentity security platform from Kobil
Coalition formed on data centre services
Network Security, Routers and Data Centres : 13 November, 2015
ICTroom is meeting the challenges placed on data centre services by increasing IT complexity through a new partnership with Atos
Results released from software licensing research
Software Asset Management and Compliance : 13 November, 2015
Gemalto has released results examining attitudes to different software licensing models rigid licence options losing favour
Security specialist becomes founding CyberInvest member
Data encryption : 13 November, 2015
Becrypt commits to UK Government CyberInvest initiative by becoming a founding member
Windows 10 certified security software with new features
Anti-virus and anti-malware software : 11 November, 2015
Internet security software from BullGuard now includes additional features including encrypted Dropbox compatible file backup
Hardware security module monitoring platform
Payment cards and e-commerce security : 11 November, 2015
Thales is now providing companies that use hardware security modules with a management platform that provides usage visibility across all locations
Integrated endpoint and network security
Network Security, Routers and Data Centres : 11 November, 2015
Sophos Security Heartbeat combines the functions and advantages of endpoint protection with next generation firewalls and unified threat management
Research shows extent of network credential thefts
Network Security, Routers and Data Centres : 11 November, 2015
CyberArk research examines network exposure to credential theft attacks which hijack privileged credentials and compromise enterprise security
Data governance for file-sync services
Software Asset Management and Compliance : 09 November, 2015
Skyfence Cloud Gateway provides data loss prevention and governance on file-sync services such as Dropbox and Google Drive
Research reveals extent of senior management data loss
Data Protection : 09 November, 2015
A survey by Imation indicates nearly half of organisations have suffered theft or loss of senior management held devices containing corporate data
Technology integration brings high level access management to Dropbox
Authentication : 09 November, 2015
Dropbox file sync service has partnered with Centrify on the use of identity and access management technology for business users
Preventing data breaches with predictive threat models
Data Protection : 09 November, 2015
Metadata Framework platform enhanced with new set of predictive threat models to provide greater ability to prevent data breaches
Lack of encryption leads to fine for CPS
Data encryption : 09 November, 2015
ViaSat blames lack of encryption for the risks posed during the data breach at the CPS potentially exposing video material of victim and witness interviews
Security company to provide advice to EU utility companies
Data Protection : 06 November, 2015
The European Network for Cyber Security gains Gemalto as a partner to provide expertise to utilities in the region
Privacy protection for PC and mobile users
Anti-virus and anti-malware software : 06 November, 2015
Avast 2016 has been launched with improved privacy protection on mobile and desktop devices as well as automatic strong password generation
Decryption key repository means an end to cyber ransom payments
Data Protection : 06 November, 2015
Kaspersky Lab creates respository of decryption keys to enable victims of Bitcryptor and CoinVault ransomware to avoid paying to access their data
Threat awareness service extends deeper into cloud
Cloud Computing Security : 06 November, 2015
The Security Everywhere threat awareness service from Cisco has been extended to provide protection for endpoints and the cloud
Single sign on for Google Cloud Directory
Cloud Computing Security : 06 November, 2015
Users of Google connected services Cloud Directory and Google login can now make use of single sign-on application from Ping Identity
Keeping protection at the right level during rapid data growth
Network Security, Routers and Data Centres : 06 November, 2015
Dan Joe Barry, VP of Positioning at Napatech explains how network appliances trends and strategies affect the Data Growth Curve
BYOD and IoT at heart of ForeScout growth
Network Security, Routers and Data Centres : 30 October, 2015
Changes in the way networks are used plus recent high profile data breaches are driving high levels of growth at ForeScout Technologies
Lack of access management limits user mobility
Authentication : 27 October, 2015
Survey from Gemalto reveals widespread restrictions on mobile devices due to a lack of authentication and identity access management capabilities
Remote management for cloud based deployments
Authentication : 27 October, 2015
Thales launches remote administration and management system for use with nShield and payShield hardware security modules
NG firewall provides ministerial protection
Network Security, Routers and Data Centres : 27 October, 2015
A Government ministry in Malaysia is protecting its cloud based hosted applications with the W30 next generation firewall and other appliances from Clavister
Cyberbullying victim support app wins prize
Mobile computing security : 21 October, 2015
Kaspersky Lab awards student team with Enable Hackathon prize for best app for their software which provides support for victims of cyber bullying
Secure access company celebrates first year of business
Authentication : 21 October, 2015
Pulse Secure has been operating for one year since its spin-off from the parent company and is now rapidly developing its products to meet the challenges of secure access
CounterACT integration with McAfee Threat Intelligence Exchange
Network Security, Routers and Data Centres : 21 October, 2015
ForeScout CounterACT network access control platform is now fully integrated with McAfee TIE via the Data Exchange Layer to bring threat protection to BYOD devices and unmanaged endpoints
Spam campaign delivers Ursnif malware
Anti-virus and anti-malware software : 16 October, 2015
Bitdefender discovers renewed campaign delivering Ursnif malware designed to target English, Russian and German speakers
App helps administrators validate patch installations
Data Protection : 16 October, 2015
Dynamic software reconciliation app from Tripwire provides a means of visualising legitimate system changes after installing security patches
Gaps identified in healthcare cyber security
Data Protection : 16 October, 2015
A new report from Trustwave shows the state of IT security in the healthcare industry with more than 9 out of 10 professionals seeing an increase in cybercrime activities in the sector
Application protection spreading across multiple industries
Internet Security and Content Filtering : 16 October, 2015
Security protection for applications from Arxan is now affecting over half a billion devices across different industry sectors including the internet of things
ForeScout makes high level executive recruitments
Network Security, Routers and Data Centres : 16 October, 2015
Network security company strengthens executive team with seasoned industry veterans to support rapid growth
Cloud backup for mobile phone contacts
Mobile computing security : 14 October, 2015
Over three billion mobile network subscribers in Africa and the Middle East now have access to cloud based backup storage for contacts
Ransomware spreads as complacency grows
Anti-virus and anti-malware software : 14 October, 2015
David Emm, principal security researcher at Kaspersky Lab explains the growing danger of ransomware and how businesses are taking large risks by not addressing the trend
Comprehensive fully managed DDoS prevention service
Anti-virus and anti-malware software : 14 October, 2015
Arbor Networks now offering on-premises mitigation from DDoS attacks as well as fully managed cloud based service
Why small businesses should avoid free anti virus products
Anti-virus and anti-malware software : 12 October, 2015
Konstantin Voronokov, Head of Endpoint Product Management at Kaspersky Lab explains why using free anti virus software might not be a good idea for small businesses
Managed endpoint milestone for privileged access management
Data Protection : 12 October, 2015
Enterprise Random Password Manager reaches deployment milestone with installation managing over a million endpoints
Software licensing contributing to increased IT complexity
Data Protection : 12 October, 2015
Survey of high level IT professionals shows perception of increased complexity in IT due to cloud computing, licensing and legacy technology
Cloud security report for 2015
Cloud Computing Security : 07 October, 2015
Application attacks increase against cloud deployments according to the Autumn 2015 cloud security report from Alert Logic
High performance next generation firewall
Network Security, Routers and Data Centres : 07 October, 2015
The W50 next generation firewall from Clavister provides the flexibility and performance needed to fulfil the requirements of highly demanding data centre environments
Credential access protection for smart meters
Authentication : 29 September, 2015
Smart metering systems from ADD are now given additional protection with Thales KeyAuthority for cryptographic key management
Threat sharing attitudes for life critical applications revealed
Data Protection : 29 September, 2015
Survey conducted by AlienVault demonstrates the shift in public opinion concerning the disclosure of threat information for life threatening circumstances
Cyber essentials certification for Intel Security
Data Protection : 29 September, 2015
Intel Security gains UK Government certification against its Cyber Essentials Scheme
High demand for security integration as endpoints proliferate
Network Security, Routers and Data Centres : 29 September, 2015
ForeScout Technologies shares the results of its CISO survey showing a greater need for integration and automation from their IT security tools
Webinar on changing nature of DDoS attacks
Anti-virus and anti-malware software : 28 September, 2015
Akamai and Bright Talk have produced a webinar which highlights the way in which Distributed Denial of Service attacks have changed
Healthcare industry falls into cyber crime spotlight
Anti-virus and anti-malware software : 28 September, 2015
Websense report examines the vulnerability of the healthcare industry to cyber attacks and reveals startling statistics on the volume of security incidents
Data encryption company acquisition
Data encryption : 28 September, 2015
ESET has bought out data encryption company DESlock+ to provide encryption based products as part of its range
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo