Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
IT Security
Dashboard provides display of network security vulnerabilities
Network Security, Routers and Data Centres : 15 October, 2013
Tenable has delivered its SecurityCenter enterprise software to SAI Global bringing improved visibility through dashboard view of network vulnerabilities
 
Industry report reveals extent of latest spam outbreak
Mobile computing security : 14 October, 2013
The end of the summer has seen a surge in levels of social media spam with the most prolific producers in Europe, according to a new AppRiver report
 
Tamper-proof jailbreak detection for mobile devices
Mobile computing security : 14 October, 2013
Designed for mobile devices used in enterprise environments, new jailbreak detection software protects companies from fraud and data loss
 
Onling gambling company takes IT infrastructure security protection
Data Protection : 14 October, 2013
Session and transaction analysis from ExtraHop's Context and Correlation Engine provides improved IT security for online gambling site
 
Partnership eases PCI DSS compliance
Software Asset Management and Compliance : 14 October, 2013
Mako Networks joins compliance company to provide simplified regulatory compliance for payment card data security
 
Web protection service added to cloud
Cloud Computing Security : 11 October, 2013
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
 
Encryption specialist joins technology alliance partnership
Data Protection : 11 October, 2013
The DESlock encryption company is the first partner to join ESET's recently formed technology alliance programme
 
Advice on protecting company information for travelling workers
Data Protection : 11 October, 2013
Iron Mountain has provided some advice for people who work while using public transport on how to protect sensitive information from commuter snoopers
 
Education software protected from DDoS attacks
Data Protection : 11 October, 2013
Software as a service supplier for the education market is protecting DDoS mitigation services from Prolexic to prevent down time
 
NFC payment system meets industry security standards
Mobile computing security : 10 October, 2013
Inside Secure has been working with LoopPay to develop the security technology needed to meet the requirements of mobile commerce security in retail environments
 
Secure PDF annotation for mobile users
Mobile computing security : 10 October, 2013
A secure app for iOS mobile devices has been developed by Accellion for the secure annotation of PDF files
 
Industry magazine awards best buy status to CounterACT
Network Security, Routers and Data Centres : 09 October, 2013
ForeScout's network access control system CounterACT has received a five-star rating and best buy status in SC Magazine product evaluation
 
Your CMS is the path of least resistance for industrial hackers
Data Protection : 09 October, 2013
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
 
Firefox extension detects cross-site scripting
Internet Security and Content Filtering : 09 October, 2013
Free Immuniweb Self-Fuzzer tool for Firefox seeks out vulnerabilities to Cross-Site Scripting or SQL-injection
 
Adobe breach could compromise software code
Data Protection : 07 October, 2013
Attackers have gained access to source code of Adobe products putting millions of users at risk of zero-day attacks
 
Taxi management system takes FortiGate network protection
Network Security, Routers and Data Centres : 04 October, 2013
FortiNet is protecting the taxi booking and payment system in use by a large taxi company operating in central London
 
Advanced port control for workstations and servers
Network Security, Routers and Data Centres : 04 October, 2013
CAPS certification given to the Advanced Port Control system from Becrypt for operation on a number of platforms including Windows Server
 
Companies collaborate on fraud prevention
Anti Fraud software : 02 October, 2013
Iovation and Equifax has got together on the development of a portfolio of products aimed at providing multi-layered fraud protection
 
Combined network and endpoint protection on show
Network Security, Routers and Data Centres : 02 October, 2013
Gateprotect is travelling to Dubai to demonstrate its latest protective technology for both endpoints and the network
 
Complex distributed network security
Network Security, Routers and Data Centres : 02 October, 2013
Peakflow SP network intelligence tool gains greater scalability for managing security on complex distributed IT networks
 
Simplified IT security compliance with 2013 release of ISO 27001
Software Asset Management and Compliance : 02 October, 2013
Compliance consultants laud the release of ISO 27001:2013, proclaiming it to provide greater simplification in attaining compliance
 
Collaborative project initiated for improved IT security
Data Protection : 01 October, 2013
The Community Open Data Initiative has been launched as a means of engaging security professionals in collaborating in the fight against cyber crime
 
Investigation into Yahoo bug bounty program
Anti-virus and anti-malware software : 01 October, 2013
Professional security researchers have been delving into the workability of Yahoo's bug bounty program for rewarding users who identify vulnerabilities and security exposures
 
Security intelligence collaboration for big data
Network Security, Routers and Data Centres : 01 October, 2013
Integration between CounterACT and Splunk Enterprise provides improved insight into threats and automatic control in big data environments
 
Report details national cyber-attack characteristics
Data Protection : 01 October, 2013
FireEye delves into the national psyche of the most advanced cyber attacks to build a profile of attack methods expected from different regions of the world
 
Secure mobile payment system on show at Las Vegas event
Finance and Banking Security : 01 October, 2013
Apriva is attending Money2020 in Las Vegas this year with its transaction handling application for mobile devices based on iOS and Android platforms
 
Two-thirds of e-mail traffic unsolicited
Anti-virus and anti-malware software : 30 September, 2013
Spam dominated e-mail traffic during August with no easing of phishing mails during the holiday season
 
Hackers create work-around for iPhone biometrics
Data Protection : 30 September, 2013
David Shear and Joe Stewart of Dell Secureworks recommend basic security measures to secure iPhones regardless of whether or not they're equipped with Touch ID biometrics
 
DDoS concentration risk response
Data Protection : 27 September, 2013
DDoS SWAT has been launched to provide companies with protection during sustained multiple distributed denial of service attacks
 
Supply chain attacking APT discovered
Anti-virus and anti-malware software : 27 September, 2013
Kaspersky Lab provides details of the Icefog advanced persistent threat (APT) aimed at disrupting Western supply chains
 
Personal cloud appliances threaten corporate security
Cloud Computing Security : 26 September, 2013
Varonis has been studying the use of personal cloud services by employees for storing items relating to work, thereby creating security risks
 
Survey shows lack of confidence in detecting attacks
Data Protection : 26 September, 2013
Over half of IT security professionals surveyed aren't confident that attacks could be reliably detected within their organisations
 
Cloud computing platform gains NG firewall protection
Network Security, Routers and Data Centres : 25 September, 2013
NEC software's virtual data centre automation cloud platform will be protected by the FortiGate next generation firewall
 
Games manufacturer takes BYOD inspection and security
Network Security, Routers and Data Centres : 25 September, 2013
The BYOD security system in use at SEGA corporation is based on ForeScout's CounterACT network access control technology
 
Balancing staff acquisition with IT security requirements
Data Protection : 24 September, 2013
Raj Samani of McAfee explains the steps needed to secure information assets in small businesses from insider threats when recruiting new staff
 
OS root kit detector available for Mac OSX
Anti-virus and anti-malware software : 24 September, 2013
Security tool from ESET available for Apple Mac users which detects malicious software that tries to infect the operating system
 
Cyber security self-assessment available online
Software Asset Management and Compliance : 24 September, 2013
IT Governance is enabling companies to assess their security position simply with the use of a new online self-assessment questionnaire
 
Cashless vending security on show at Canadian event
Payment cards and e-commerce security : 24 September, 2013
Apriva is attending the Canadian Automatic Merchandising Association event to demonstrate its software for securing cashless vending transactions
 
Hardware features in latest bank hacking attempt
Finance and Banking Security : 23 September, 2013
Kaspersky Lab comments on the use of a combination of hardware and software to gain access to customer records at Barclays bank
 
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Data Protection : 20 September, 2013
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
 
Is biometric authentication reliable enough for payment security?
Authentication : 20 September, 2013
Andy Kemshall of SecurEnvoy examines the trend towards the use of biometrics for consumer authentication and explains how it isn't yet mature enough to cope with the high reliability needs of the payment industry
 
Best practice guide for DDoS protection
Anti-virus and anti-malware software : 20 September, 2013
A guide is available for understanding the best industry practices for protecting e-commerce web sites from the perils of Distributed Denial-of-Service (DDoS) attacks
 
Multi-device internet security protection
Internet Security and Content Filtering : 20 September, 2013
With the discovery that data is more valuable than devices to IT consumers, Kaspersky Lab is now offering multi-device internet security protection
 
Best practice guidelines for public sector cyber security
Data Protection : 19 September, 2013
A report is being released on operating securely in the digital world, offering best practice guidelines for mitigating IT risks in the UK public sector
 
Secure file sharing available on enterprise protection
Data Protection : 19 September, 2013
Becrypt has combined the conflicting areas of data loss prevention with secure file sharing on one product with mShare for enterprise data protection
 
Time to resolve security attacks of significant concern
Data Protection : 19 September, 2013
Survey from forensics specialist Guidance Software shows that a third of IT security professionals believe the time to resolve attacks to be the number one concern
 
Fraud protection on anonymous internet transactions
Anti Fraud software : 18 September, 2013
Iovation releases add-on for reputationManager to reduce fraud on anonymous proxy servers which have shown to be 30 times risker than transactions that are not performed anonymously
 
Policy management software for maintaining compliance
Software Asset Management and Compliance : 17 September, 2013
Tripwire's enterprise policy management draws on main industry standards and regulations to reduce security exposures and ensure compliance
 
Policy compliance software integrated with privileged account management
Data Protection : 17 September, 2013
Lieberman and Qualys have integrated their products for enterprise password management with vulnerability management and policy compliance
 
Passive vulnerability scanner available as standalone product
Network Security, Routers and Data Centres : 16 September, 2013
Tenable Network Security is providing broader availability of its Passive Vulnerability Scanner for corporate networks
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com