Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
New leadership for web security company
Internet Security and Content Filtering : 15 April, 2015
Industry expert with 20 years experience joins web security company, WhiteHat Security as its new Chief Executive
 
International consortium disrupts major botnet
Anti-virus and anti-malware software : 15 April, 2015
A group of IT companies led by the Interpol police service have successfully brought down the Simda botnet linking computers globally
 
NFC based authentication could see an end to passwords
Authentication : 14 April, 2015
SecurEnvoy is using the RSA Conference to demonstrate its prototype of single swipe authentication for Windows 10 using Near Field Communication
 
Secure USB promotion marks device landmark
Data Protection : 14 April, 2015
Imation is introducing a Golden IronKey programme to celebrate selling over two million secure USB memory drives
 
Public sector network computing award
Network Security, Routers and Data Centres : 14 April, 2015
ForeScout Technologies gains network computing award success in recognition for project at Sutton and East Surrey Water
 
Research reveals continued risk from heartbleed
Anti-virus and anti-malware software : 08 April, 2015
Incomplete remediation from heartbleed leaves UK companies at risk a year after the vulnerability was first recognised
 
Security management for Amazon Web Services
Unified Threat Management : 08 April, 2015
Unified Security Management released to provide security controls and threat intelligence for users of Amazon Web Services
 
Cloud security platform enhanced by technology acquisition
Cloud Computing Security : 08 April, 2015
CipherCloud has acquired cloud security analytics technology to enhance its enterprise cloud security platform
 
Tackling Today’s Authentication Complexities
Authentication : 07 April, 2015
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
 
Improved network visibility and security at Norwich School
: 07 April, 2015
ForeScout CounterACT is providing the independent Norwich School with network visibility, regulatory compliance and potential breach mitigation
 
IT security company evolution
Anti-virus and anti-malware software : 02 April, 2015
Kirill Slavin, General Manager, Kaspersky Lab UK and Ireland, explains Why diversify or die doesn’t always ring true in an ever-evolving IT security market place
 
Payment card industry compliance consultancy available
Software Asset Management and Compliance : 02 April, 2015
Foregenix is offering a free service to provide consultancy on meeting Payment Card Industry standard compliance
 
Insecure personal data on wearable technology
Mobile computing security : 01 April, 2015
Kaspersky Lab discovers security flaws exposing personal data to risk when using wearable technology for fitness assessment
 
Increase in cyber attacks affects all sizes of companies
Data Protection : 01 April, 2015
Darren Anstee, Director of Solutions Architects at Arbor Networks puts perspective on the cyber security landscape and shows it isn't just large companies that are at risk
 
Change tracking for PCI DSS Compliance
Software Asset Management and Compliance : 26 March, 2015
US IT company chooses to supply its customers with Change Tracker Enterprise from NNT for improving compliance to PCI DSS standards
 
Call for cloud-based digital signature recognition in EU standards
Data Protection : 26 March, 2015
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate
 
Matching security to increased network performance
Network Security, Routers and Data Centres : 26 March, 2015
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems
 
Secure Email and FTP protects sensitive pupil data
Data encryption : 23 March, 2015
Primary school in London borough of Ealing adopts e-mail and file encryption service to protect pupil data in e-mails and file transfers
 
Financial services compliance expansion
Software Asset Management and Compliance : 20 March, 2015
Additional functions available on Proofpoint Enterprise Archive for improving compliance of financial services companies to regulatory requirements
 
Insider threat protection to increase during 2015
Data Protection : 20 March, 2015
Research from IS Decisions shows that existing levels of just of 40 percent for insider threat protection will increase within the UK during this year
 
Three key IT security focus areas identified
Data Protection : 19 March, 2015
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
 
Hardware encrypted USB storage with PIN access
Data encryption : 19 March, 2015
Solid state secure memory device with hardware encryption from iStorage is available with PIN based access control
 
Virtualised cloud communication security
Cloud Computing Security : 18 March, 2015
The virtualised real-time communications system from Sonus Networks brings enhanced security and intelligence
 
Cloud based digital signing for clinical trials
Authentication : 12 March, 2015
SureClinical is using nShield hardware security modules from Thales for secure digital signing in clinical trials
 
Secure data on the move for TfL using hardware encrypted flash memory
Data encryption : 12 March, 2015
Hardware encrypted secure USB storage devices by iStorage are being used by Transport for London to help prevent loss of mobile data
 
Unified Security Management for card payment system provider
Data Protection : 12 March, 2015
Crosskey has chosen Unified Security Management from AlienVault for increased security visibility in its card payment processing operations
 
Student loan agency employs multi factor authentication
Authentication : 12 March, 2015
A US student loan service provider is using IDPrime .NET from Gemalto for multi-factor authentication to replace passwords
 
Security-as-a-Service firewall available in Holland
Network Security, Routers and Data Centres : 11 March, 2015
Clavister partners in Holland are now able to offer the company's Security-as-a-service firewall for managed security service providers
 
Proactive document threat detection
Anti-virus and anti-malware software : 11 March, 2015
Check Point Threat Extraction takes a new approach to eliminating the threats posed by infected documents
 
New malware bypasses CAPTCHA
Anti-virus and anti-malware software : 11 March, 2015
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money
 
New wave of Cryptowall ransomware attacks
Anti-virus and anti-malware software : 10 March, 2015
Bitdefender uncovers new distribution mechanism for the Cryptowall ransomware through spam campaign
 
Natural language processing for preventing spear phishing
Anti-virus and anti-malware software : 10 March, 2015
OpenDNS develops new model of making real-time detections of targetted phishing campaigns using natural language processing
 
Key actions needed to ensure digital safety
Data Protection : 10 March, 2015
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe
 
On-demand web penetration testing available to security suppliers
Internet Security and Content Filtering : 06 March, 2015
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
 
Console provides real time social media threat information
Data Protection : 06 March, 2015
Proofpoint is now supplying its Nexgate Social Threat Centre, a console for providing administrators with up to date information on social media threats
 
End to end control for real time communications networks
Network Security, Routers and Data Centres : 05 March, 2015
Sonus IQ has been released to provide real time communications network operators with a security and intelligence platform
 
Mobile security for wearable technology
Mobile computing security : 05 March, 2015
LG Electronics is making use of mobile access control from baimos technologies for its latest wearable devices
 
Centralised e-mail encryption
Data encryption : 05 March, 2015
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
 
Poor management of social messaging and file sharing in business
Data Protection : 05 March, 2015
A study undertaken by Iron Mountain shows an alarmingly low level of management of third party file-sharing systems and social messaging in the enterprise
 
Multi-factor authentication for wearable technology
Authentication : 04 March, 2015
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
 
Intelligent protection combats grey route mobile messaging
Mobile computing security : 04 March, 2015
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
 
Big data analytics provide network investment decision support
Network Security, Routers and Data Centres : 04 March, 2015
CommsReveal from BAE Systems is designed to provide network intelligence through big data analytics to communications service providers to enable decisions to be made on investments and network changes
 
Collaboration extends NFC adoption opportunities
Mobile computing security : 04 March, 2015
Virtual access, ID and other card system implementations have been simplified through a technology collaboration between NXP Semiconductors and MeaWallet
 
The most dangerous IT threats of the year and how to neutralise them
Network Security, Routers and Data Centres : 02 March, 2015
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
 
IT security and the Internet of Things
Anti-virus and anti-malware software : 02 March, 2015
Luis Corrons of Panda Security explains how the Internet of Things provides new opportunities for cyber criminals in an increasingly connected world
 
Cloud based real time communications demonstration at MWC
Cloud Computing Security : 02 March, 2015
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
 
Third party loophole behind TalkTalk breach
Data Protection : 02 March, 2015
LogRhythm discusses the need for controlling third-party organisation IT security to reduce the threat of corporate data breaches
 
New CEO appointed at ForeScout Technologies
Network Security, Routers and Data Centres : 02 March, 2015
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer
 
Award recognition for ForeScout channel partner
Network Security, Routers and Data Centres : 27 February, 2015
High revenue growth rates in 2014 for enterprise sales has earned the 2014 ForeScout EMEA Channel Partner Award for NTT Com Security
 
Research published on Security-as-a-Service for communication service providers
Network Security, Routers and Data Centres : 27 February, 2015
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo