Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
IT Security
Survey reveals extent of European cloud data storage acceptance
Cloud Computing Security : 28 August, 2014
Nearly half of EU companies still retain certain types of data on servers with continuing caution being shown for moving their data to the cloud
Secure login credentials using QR Codes
Authentication : 28 August, 2014
Verizon has developed a system whereby registered users can apply for a QR Code for use as a secure login credential with or without secondary credentials liks PINs or passwords.
Trojan delivery exploits Ukrainian political situation
Anti-virus and anti-malware software : 27 August, 2014
Hackers are using spam exploiting anti-western feelings in Russia to deliver malicious code for further spreading malware
Russian mobile operator protects subscribers from spam
Mobile computing security : 22 August, 2014
Cloudmark is providing Beeline mobile users in Russia with protection against spam, phishing and malware attacks
Additional security for Android Wear Watch owners
Mobile computing security : 22 August, 2014
Smart wearable technology gets the secure treatment with the available of mobile security and antivirus specifically for the wearable market from Bitdefender
IP reputation service integrated with security intelligence platform
Data Protection : 22 August, 2014
The BrightCloud IP reputation service from Webroot is being used for providing threat intelligence input to the security intelligence platform from LogRhythm
Home entertainment system vulnerabilities
Anti-virus and anti-malware software : 22 August, 2014
Experiment at Kaspersky Lab reveals the extent to which home entertainment systems lack security features exposing their users to unnecessary vulnerabilities
Survey illustrates risks to social network users
Anti-virus and anti-malware software : 20 August, 2014
Complacency towards personal security is still widespread amongst social network users according to results of a new survey
Automatic logging on exposes users to high cyber risk
Data Protection : 20 August, 2014
Research from Intercede shows the extent to which users are automatically logging on to e-mail and social network sites or sharing passwords with other people
Tokenless 2 factor payment processing
Authentication : 19 August, 2014
Using tokenless two-factor authentication for payment processing can overcome the problems associated with PCI compliance
Web application firewall supports streaming service move to the cloud
Network Security, Routers and Data Centres : 19 August, 2014
blinkbox movie and TV streaming service has made the move to the cloud whilst saving millions of pounds with Barracuda Web Application Firewall and Microsoft Azure
Local supplier agreement puts NG firewalls in reach of Croatian market
Network Security, Routers and Data Centres : 18 August, 2014
Clavister has struck a deal with itSoft to provide its next-generation firewall products into the local Croatian market
Manufacturing IP loss running at a fifth
Anti-virus and anti-malware software : 18 August, 2014
Global business management survey by Kaspersky Lab puts level of manufacturers suffering intellectual property losses through malware and other causes at over 20%
Cellular remote management assists hospital robot maintenance
Network Security, Routers and Data Centres : 18 August, 2014
Opengear has supplied remote management gateways to a supplier of medical robotic technology for remote maintenance and control using the cellular network
Study examines the threat of rogue ex-employees
Data Protection : 14 August, 2014
Continued access to critical data by former employees is the theme of a report issued by Intermedia on insider threat protection
XMT Smart Engineering Engine at heart of new consumer range of security products
Anti-virus and anti-malware software : 14 August, 2014
The Panda range of consumer antivirus, mobile and internet security products features the new XMT Smart Engineering engine for new levels of protection
Risk assessment software helps investigate compromised user credentials
Data Protection : 14 August, 2014
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Online security top of the list for retail buyers
Data Protection : 13 August, 2014
Survey of retail consumers shows that improved online security tops the list of requirements for customer satisfaction
Bremer Bank improves user security and satisfaction with CounterACT
Network Security, Routers and Data Centres : 13 August, 2014
Real time network visibility and access control integrated with SIEM solution provides Bremer Financial Corporation with enhanced security with improved user experience
Central management console for security appliances
Network Security, Routers and Data Centres : 12 August, 2014
Cyberoam Central Console provides enterprises with the ability to manage double the number of security appliances
Secure USB devices with BadUSB protection
Data Protection : 12 August, 2014
The IronKey range of secure USB devices from Imation isn't vulnerable to the BadUSB malware designed to attack the device itself
Young people training in cyber warfare a positive step
Data encryption : 12 August, 2014
Thales UK comments on the initiative to train UK young people as part of the Cyber Security Challenge being necessary in order to bridge the skills gap
Application delivery controller integration with certificate intelligence center
Data Protection : 11 August, 2014
A10 Networks has gained support for its application delivery controllers from Symantec from its Certificate Intelligence Center for improved management of critical security information
Consumers fear security of mobile banking apps
Mobile computing security : 11 August, 2014
Survey from Intercede reveals extent of consumer concern over the security aspects of using mobile apps for online banking
Additional features for Application Delivery Controller
Data Protection : 07 August, 2014
A10 Networks is providing extra security features for its Application Delivery Controller to help organizations combat evolving threats
Partnership reduces mean time to threat mitigation
Network Security, Routers and Data Centres : 07 August, 2014
ForeScout and ThreatStream have agreed on a partnership to combine threat information and network security intelligence on one platform based on ControlFabric architecture
Software for meeting regulatory requirements on money laundering
Anti Fraud software : 07 August, 2014
The NetReveal Anti-Money Laundering software from BAE Systems Applied Intelligence provides organizations with a means of keeping up with increasingly rigorous regulatory requirements
A change of approach is needed in advanced threat protection
Advanced Persistent Threat (APT) protection : 07 August, 2014
Sourcefire's Sean Newman comments on advanced threat detection and the need for organizations to move away from traditional protection methods
Identity management combined with trusted device technology
Authentication : 06 August, 2014
Application deployment on mobile devices eased with the blending of identity management from Intercede with trusted device technology from Trustronic
Organizational weak links contribute to increasingly dynamic threat landscape
Data Protection : 06 August, 2014
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Technology partners take part in BlackHat interoperability testing
Network Security, Routers and Data Centres : 05 August, 2014
Six technology partners of ForeScout are attending BlackHat USA event this week to demonstrate interoperability based on ControlFabric
Major OS upgrade for network security and UTM appliances
Network Security, Routers and Data Centres : 05 August, 2014
CyberoamOS has undergone a major upgrade covering the company's NG firewalls and UTM appliances for greater security, simplicity and interoperability
Cooperative project provides multi-factor authentication to Croatian bank
Authentication : 01 August, 2014
HID Global and its partners have used the ActivID Authentication appliance as part of the authentication system for online banking services at a bank in Croatia
Network security platform integration with vulnerability analysis
Network Security, Routers and Data Centres : 01 August, 2014
ForeScout Technologies and Rapid7 have partnered to integrate their vulnerability analysis and network security products for reducing windows of exposure
Survey results demonstrated IT spending priorities in the UK
Anti-virus and anti-malware software : 01 August, 2014
IT security summary report shows surprising levels of complacency in UK businesses towards prioritising IT security when setting budgets
Partnership to fight fraud in Central America
Anti Fraud software : 01 August, 2014
Equifax and iovation will be targeting the Central American region to distribute fraud prevention systems to combat escalating fraud-related crime
Application management crucial to business protection
Data Protection : 31 July, 2014
Tufin Technologies comments on the major network disruption which could be experienced by businesses that are increasingly dependend on applications
Brazil sees peak in malware activity in June
Anti-virus and anti-malware software : 31 July, 2014
The World Cup resulted in an increase in phishing activity within the banking sector and other malware during June according to Kaspersky report
Corporate data risks through mixing personal and business applications on one device
Data Protection : 31 July, 2014
Florian Malecki, international product and marketing director, Dell Security examines the corporate security problems associated with the BYOD culture
Cloud based Unified Threat Intelligence
Data Protection : 31 July, 2014
Cloud based unified threat intelligence service available from Bit 9 and Carbon Black for protection against advanced threats and targeted attacks
Breach level index shows extent of data records compromised
Data Protection : 31 July, 2014
According to SafeNet's Breach Level Index for 2Q14, 375 million customer data records were compromised with the retail sector being the hardest hit
PCI inertia maintains high cyber risk for retailers
Data Protection : 30 July, 2014
Not enough retailers are taking cyber security seriously despite the proven vulnerability of the sector and concern from within the retail industry
Highly secure USB flash storage for personal data protection
Data Protection : 30 July, 2014
The datAshur Personal flash drive from iStorage has been launched as an ultra-secure but affordable personal data storage device
Police message Android ransomware also targets PC users
Anti-virus and anti-malware software : 29 July, 2014
Kaspersky Lab explains the Koler ransomware distribution model involving complex automatic re-directs which affect Android and PC users
New encrypting ransomware detected
Anti-virus and anti-malware software : 28 July, 2014
Kaspersky Lab explains new malware discovered similar to CryptoLocker which demands ransoms for decrypting locked data assets
Gateways available for data centre security
Network Security, Routers and Data Centres : 28 July, 2014
Two appliances have been released by Check Point aimed at high end data centres to provide a secure gateway
Back up flexibility for small businesses
Backup, Data Recovery and Disaster Recovery : 28 July, 2014
Barracuda releases a new backup appliance and upgrades capacity of existing equipment to meet data protection and recovery needs of smaller businesses
Messaging and billing company takes secure platform for AWS
Data Protection : 23 July, 2014
Alert Logic is supplying Fonix Mobile with a secure messaging and payment platform on Amazon Web Services for its SMS messaging and mobile payment billing services
Data security and compliance for Middle East users
Software Asset Management and Compliance : 23 July, 2014
Partnership between Saturn Middle East and New Net Technologies brings data security and compliance software to the region
Multi-factor authentication product line expanded
Authentication : 23 July, 2014
The Cloud Identity Summit has seen a move further away from password based authentication with the release of new products from Ping Identity
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012