Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Parking fine malware plagues UK
Anti-virus and anti-malware software : 24 June, 2014
Bitdefender is warning UK computer users of malware designed to steal confidential information through bogus parking fine reminder notices
 
Threat intelligence service integrated with network security platforms
Network Security, Routers and Data Centres : 24 June, 2014
Webroot's BrightCloud Security Services for Enterprise bring threat intelligence to organizations operating network security and management systems from certain suppliers
 
Tokenless two-factor authentication for VPN access
Authentication : 24 June, 2014
The virtual private network of The Lowry cultural centre at Salford Quays is being secured using tokenless two-factor authentication technology from SecurEnvoy
 
Managed service for application monitoring
Data Protection : 24 June, 2014
The Panda Advanced Protection Service takes proactive approach to security with automatic application classification and exploit detection
 
A quarter of attacks target web services and applications
Anti-virus and anti-malware software : 24 June, 2014
Threat data from NTT Com Security indicates levels of attacks being used to target web services and applications in the UK
 
18 percent of smaller businesses face Windows XP risks
Data Protection : 23 June, 2014
Research shows that large numbers of small and medium sized businesses are continuing to face malware attack risks by using the unsupported Windows XP operating system
 
Poor threat intelligence leads to growth in successful attacks
Anti-virus and anti-malware software : 23 June, 2014
Check Point reveals the growth in successful malware attacks resulting from increasing software sophistication and lack of threat intelligence
 
Network security company in Hot Companies and Best Product Awards finals
Network Security, Routers and Data Centres : 23 June, 2014
ForeScout's Rollins College network security platform installation has resulted in reaching the finals of the 2014 Hot Companies and Best Products Awards
 
Mobile identity platform for online access
Mobile computing security : 20 June, 2014
Operators of mobile services can offer subscribers a mobile identity system which can provide authentication for online services using a mobile phone
 
Mobile security and kill switch pre-installed on LG smartphone
Mobile computing security : 20 June, 2014
The latest LG G3 smart phone will benefit from pre-installation of Mobile Security from McAfee which includes an anti-theft kill switch feature
 
Advanced SIEM for improved detection rates
Data Protection : 19 June, 2014
NTT Com Security is improving the detection of unknown threats with its advanced security information and event management capabilities
 
Survey shows extend of unsuitable content on child mobiles
Internet Security and Content Filtering : 19 June, 2014
One out of every seven parents surveyed by BullGuard had found unsuitable content on the mobile devices belonging to their children
 
Fraud management for travel operators
Anti Fraud software : 19 June, 2014
The travel industry is now able to manage fraud more effectively due to partnership agreement between CyberSource and Amadeus
 
An Intelligent Approach to Fighting Cyber Attacks
Data Protection : 19 June, 2014
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime
 
NFC technology collaboration agreement
Software Rights Management : 16 June, 2014
Intel and Inside Secure have closed an agreement on intellectual property licences and the use of NFC technology
 
Tokenless authentication protects insurance broker
Authentication : 16 June, 2014
An insurance broker has taken SecurAccess tokenless authentication for improving protection for user identification
 
Mobile protection from botnets and ransomware
Mobile computing security : 16 June, 2014
David Emms of Kaspersky Lab comments on the disruption of GameOver Zeus and CryptoLocker and the need for mobile users not to lower their guard
 
Online media protection agreement
Software Rights Management : 12 June, 2014
Sky Deutschland is using Digital Rights Management Fusion Agent software from Inside Secure for protecting video content delivery
 
Internet of Things generating greater threat exposure fears
Anti-virus and anti-malware software : 10 June, 2014
IT adminstrators have been surveyed by GFI Software about the level of threats through mobile devices created by the Internet of Things
 
Continuous monitoring and mitigation webinar
Network Security, Routers and Data Centres : 10 June, 2014
ForeScout Technologies sponsors SANS Webinar on the benefits of continuous monitoring and mitigation
 
Network security planning roadshow hits London in June
Network Security, Routers and Data Centres : 09 June, 2014
Tufin Technologies is bringing its Impact 2014 roadshow to London this month with information on network security planning for businesses
 
Strong authentication for cloud service providers
Authentication : 09 June, 2014
The Protiva Cloud confirm authentication system from Gemalto is compatible with HP CloudSystem for CSPs
 
UK Financial organisation security confidence surveyed
Data Protection : 09 June, 2014
Tripwire has released the conclusions of its survey into the confidence placed by UK financial organisations in the security controls they have in place
 
Mobile security and trusted authentication partnership
Mobile computing security : 06 June, 2014
Intercede and Good Technology have integrated their products for providing trusted authentication technology for BYOD users
 
USA takes action against botnet administrator
Anti-virus and anti-malware software : 06 June, 2014
Dell SecureWorks has provided details of the actions taken against Cyrptolocker ransomware and the Gameover Zeus botnet
 
Anti-virus company joins fight against cyber crime
Anti-virus and anti-malware software : 06 June, 2014
Bitdefender is offering its services to CERT and the police to enable them to use its experience in the escalating fight against cyber crime
 
How to avoid becoming a GOZeus and Cryptolocker victim
Anti-virus and anti-malware software : 06 June, 2014
Kasperky Lab's David Emm provides some insignt into staying protected against the highly publicised GameOver Zeus and Cryptolocker threats
 
Perimeter security appliance for corporate networks
Network Security, Routers and Data Centres : 06 June, 2014
Panda releases the GateDefender eSeries version 5.50 including additional features for providing enhanced perimeter security on corporate networks
 
UK needs greater cyber-threat awareness
Anti-virus and anti-malware software : 05 June, 2014
IT security expert panel at InfoSecurity Europe event declares greater need for awareness of cloud computing and cyber security in UK businesses
 
BYOD security and compliance risk mitigation at large US college
Network Security, Routers and Data Centres : 05 June, 2014
Florida based Broward College employs ForeScout CounterACT for the security and management of all network-connected devices across its campuses
 
Identity management specialist invest in EMEA expansion
Authentication : 05 June, 2014
Centrify has invested in the development of the market in EMEA for Identity-as-a-Service with key appointments in the region
 
Short window to protect against Gameover Zeus
Anti-virus and anti-malware software : 03 June, 2014
Websense provides advice on protection against the Gameover Zeus malware which is expected to soon launch a significant attack
 
Social Media used in cyber-espionage campaign
Anti-virus and anti-malware software : 02 June, 2014
CyberArk comments on the use of social media by hackers to conduct cyber espionage campaign to spy on US officials
 
IT security discounts available for UK education sector
Anti-virus and anti-malware software : 02 June, 2014
Educational institutions in the UK can benefit from the Education Discount Policy being offered on IT security products by Cyberoam
 
Companies failing to reset password credentials of leavers
Authentication : 30 May, 2014
Study from Lieberman Software discovers over 13% of professionals in the IT security industry can still access the systems of former employers
 
Big data retrieval leading to increased burden on IT resources
Data Protection : 30 May, 2014
A study by Iron Mountain has shown that IT professionals are under increasing pressure to devote more time to the retrieval of data
 
Operating in zero trust environments
Network Security, Routers and Data Centres : 30 May, 2014
Dr Wieland Alge, Vice President and General Manager EMEA Barracuda Networks discusses zero trust environment infrastructures and the role of the CIO
 
Brazilian network security partnership
Network Security, Routers and Data Centres : 28 May, 2014
Clavister enters partnership to provide public sector and private industry clients with advanced IT security systems in Brazil
 
Game producer consults IT security experts on plot authenticity
Anti-virus and anti-malware software : 28 May, 2014
Kaspersky Lab has been helping entertainment supplier Ubisoft to authenticate adventure-game plot involving the exploits of a hacker
 
Risk-based authentication supplier acquisition
Authentication : 28 May, 2014
Vasco is expanding into fraud detection and risk based authentication with the acquisition of Risk IDS
 
Mobile app for secure single sign-on access
Mobile computing security : 27 May, 2014
Apple and Android mobile computing users can now access corporate resources securely with single sign-on access from Ping Identity
 
Network security product wins US government award
Network Security, Routers and Data Centres : 27 May, 2014
CounterACT from ForeScout Technologies has achieved gold status in the 2014 Govies Government Security Awards
 
App lock provides greater security for Android users
Mobile computing security : 23 May, 2014
Mew mobile security module enables Android smartphone users to control access to the phone's apps
 
Threat intelligence platform for preventing attacks
Anti-virus and anti-malware software : 23 May, 2014
The ThreatCloud IntelliStore from Check Point gathers threat intelligence from multiple sources to provide enhanced threat protection
 
Cyberworld portal shows real-time statistics
Anti-virus and anti-malware software : 23 May, 2014
A portal released by Kaspersky Lab provides realtime malware and threat information statistics
 
Cloud security supports VPN access to Azure platform
Cloud Computing Security : 23 May, 2014
FortiGate security appliances now support a wider range of cloud platforms with the addition of Microsoft's Azure
 
Heartbleed protection best practices
Data encryption : 22 May, 2014
Kalle Jääskeläinen of SSH Communications Security explains the seriousness of the consequences of Heartbleed and best practices for protecting against them
 
Online pet fraud on the rise
Anti-virus and anti-malware software : 22 May, 2014
Bitdefender is warning pet lovers of the appearance of fraudulent web sites targeting pet owners in the UK
 
IT security gap widens with extended BYOD
Mobile computing security : 22 May, 2014
Webroot survey shows how unsecured employee owned devices now outnumber the quantity of devices managed by the companies they work for
 
Mobile security and antivirus app for Android devices
Mobile computing security : 22 May, 2014
BullGuard is now providing smart protection for phones and tablets operating on the Android platform with its new Mobile Security and Antivirus app
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo