Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Extended Azure support on web application firewall
Internet Security and Content Filtering : 17 July, 2014
The latest web application firewall from Barracuda features extended support for Microsoft Azure to enable greater advantage to be realised in cloud infrastructures
 
Cyber security report: 96 percent of organisations have experienced a serious incident in past year
Network Security, Routers and Data Centres : 17 July, 2014
Sponsored by ForeScout Technologies, the 2014 Cyber Defence Maturity Report is independent research conducted by IDG Connect during May and June of 2014. Survey respondents included 1600 IT information security decision makers in organisations of more than 500 employees, and spanning five industry sectors in the US, the UK and the German-speaking region of Europe (DACH). A key finding of the report is that more than 96% of organisations experienced a significant IT security incident in the past year. One in six organisations have had five or more significant security incidents in the past 12 months. And while confidence in IT security management appears optimistic, overall findings showed a contradiction in efficacy and likely investment, compared to where incidents have been most impactful.
 
FIPS certification for PC on a stick
Data Protection : 15 July, 2014
The IronKey Workspace W700 PC on a stick from Imation has received FIPS 140-2 level 3 certification enabling its use in federal agencies
 
High 2FA sales growth in Australasia
Authentication : 15 July, 2014
SecurEnvoy has seen significant sales growth in Australia and New Zealand on the back of increasing BYOD trends in the region
 
New York college bolsters network security with additional functions
Network Security, Routers and Data Centres : 14 July, 2014
Existing ForeScout security user upgrades network threat protection to include asset management and compliance as well as network control and policy enforcement
 
Continued protection needed against CryptoLocker threat
Anti-virus and anti-malware software : 14 July, 2014
Bitdefender report explains the rise and temporary fall of the Cryptolocker malware and how companies need to continue to maintain protection against it
 
Low awareness levels of ICO fines for breaching Data Protection Act
Data Protection : 14 July, 2014
A third of security professionals responding to an iStorage survey were unaware of the level of financial penalties companies face for Data Protection Act breaches
 
Certification success for web application firewall
Network Security, Routers and Data Centres : 08 July, 2014
ICSA Labs have provided web application firewall certification to application delivery controller products from A10 Networks
 
One time passwords provide remote access for consultant engineers
Network Security, Routers and Data Centres : 08 July, 2014
Two-factor authentication based on SMS delivered one-time passwords is providing network access security for a Dutch engineering consultancy
 
E-mail spam reaches almost 70% during May
Internet Security and Content Filtering : 08 July, 2014
May saw a small reduction in e-mail spam with mass educational mailings offering distance learning being predominant
 
Next generation firewall released for mid-market
Internet Security and Content Filtering : 08 July, 2014
Affordable next generation firewall from Barracuda Networks features customisable user interface and advanced application control
 
DRM technology protects Japanese video distributor
Software Rights Management : 03 July, 2014
Live video distribution system for mobile devices in Japan to use DRM Fusion Server for the protection of content delivery
 
Open Threat Exchange now includes free threat finding facility
Anti-virus and anti-malware software : 03 July, 2014
OTX ThreatFinder from AlienVault enables IT security professionals to analyse threat exposures across their networks
 
Single sign-on for spend management system
Authentication : 02 July, 2014
Centrify Single Sign-on and mobile management has been integrated with the Concure spend management services for its users
 
Reducing Risk With Effective Encryption Management
Data encryption : 02 July, 2014
Jason Thompson, Director of Global Marketing at SSH Communications Security discusses the role of encryption management in risk reduction
 
Web based analytics for DDoS visibility
Anti-virus and anti-malware software : 02 July, 2014
SecureWatch Analytics from Corero provides dashboard based security intelligence based on Splunk big data analytics platform
 
Securing Third-Party Access of IT Systems in the Public Sector
Authentication : 02 July, 2014
Matt Middleton-Leal, Regional Director, UK and Ireland at CyberArk discussing the security challenge surrounding the emerging trend of smaller companies gaining privileged access to Government IT resources
 
Digital Rights Management on Android devices
Software Rights Management : 02 July, 2014
Intel based mobile devices running on the Android platform can now be protected from running illegal premium content using digital rights management technology
 
How cyber-criminals are exploiting the World Cup event
Internet Security and Content Filtering : 01 July, 2014
The EMEA Managing Director of Cisco, Graham Welch, explains why everyone should be on their guard when using internet connected devices to follow World Cup progress
 
Selfmite SMS work attacks smartphone users
Mobile computing security : 01 July, 2014
AdaptiveMobile warns of malicious app which propagates by SMS fooling users into installing a worm for infecting the user address book
 
Single smart credential for user validation
Authentication : 26 June, 2014
Cloud based single credentialing system helps reduce data breaches through strong user authentication available in a SaaS model
 
Connected home risk survey results
Network Security, Routers and Data Centres : 26 June, 2014
Fortinet reveals the greatest risks that homeowners face with the extension of the "internet of things" into the home environment
 
Cambridge sixth form college installs BYOD programme to increase network security
Network Security, Routers and Data Centres : 26 June, 2014
Long Road Sixth Form College in Cambridge, England, has selected ForeScout CounterACT to ease the roll-out of its bring your own device (BYOD) program by providing real-time visibility of what is connected to the network: devices - personal and mobile, applications and users. These factors, combined with broad infrastructure interoperability, have helped to increase the security of the Long Road's network, as well as the productivity of the students.
 
Montreal takes highest SMS spam levels in Canada
Mobile computing security : 25 June, 2014
Forthcoming anti-spam legislation in Canada could show a reduction in the high levels of SMS spam endured by mobile users in Montreal
 
Parking fine malware plagues UK
Anti-virus and anti-malware software : 24 June, 2014
Bitdefender is warning UK computer users of malware designed to steal confidential information through bogus parking fine reminder notices
 
Threat intelligence service integrated with network security platforms
Network Security, Routers and Data Centres : 24 June, 2014
Webroot's BrightCloud Security Services for Enterprise bring threat intelligence to organizations operating network security and management systems from certain suppliers
 
Tokenless two-factor authentication for VPN access
Authentication : 24 June, 2014
The virtual private network of The Lowry cultural centre at Salford Quays is being secured using tokenless two-factor authentication technology from SecurEnvoy
 
Managed service for application monitoring
Data Protection : 24 June, 2014
The Panda Advanced Protection Service takes proactive approach to security with automatic application classification and exploit detection
 
A quarter of attacks target web services and applications
Anti-virus and anti-malware software : 24 June, 2014
Threat data from NTT Com Security indicates levels of attacks being used to target web services and applications in the UK
 
18 percent of smaller businesses face Windows XP risks
Data Protection : 23 June, 2014
Research shows that large numbers of small and medium sized businesses are continuing to face malware attack risks by using the unsupported Windows XP operating system
 
Poor threat intelligence leads to growth in successful attacks
Anti-virus and anti-malware software : 23 June, 2014
Check Point reveals the growth in successful malware attacks resulting from increasing software sophistication and lack of threat intelligence
 
Network security company in Hot Companies and Best Product Awards finals
Network Security, Routers and Data Centres : 23 June, 2014
ForeScout's Rollins College network security platform installation has resulted in reaching the finals of the 2014 Hot Companies and Best Products Awards
 
Mobile identity platform for online access
Mobile computing security : 20 June, 2014
Operators of mobile services can offer subscribers a mobile identity system which can provide authentication for online services using a mobile phone
 
Mobile security and kill switch pre-installed on LG smartphone
Mobile computing security : 20 June, 2014
The latest LG G3 smart phone will benefit from pre-installation of Mobile Security from McAfee which includes an anti-theft kill switch feature
 
Advanced SIEM for improved detection rates
Data Protection : 19 June, 2014
NTT Com Security is improving the detection of unknown threats with its advanced security information and event management capabilities
 
Survey shows extend of unsuitable content on child mobiles
Internet Security and Content Filtering : 19 June, 2014
One out of every seven parents surveyed by BullGuard had found unsuitable content on the mobile devices belonging to their children
 
Fraud management for travel operators
Anti Fraud software : 19 June, 2014
The travel industry is now able to manage fraud more effectively due to partnership agreement between CyberSource and Amadeus
 
An Intelligent Approach to Fighting Cyber Attacks
Data Protection : 19 June, 2014
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime
 
NFC technology collaboration agreement
Software Rights Management : 16 June, 2014
Intel and Inside Secure have closed an agreement on intellectual property licences and the use of NFC technology
 
Tokenless authentication protects insurance broker
Authentication : 16 June, 2014
An insurance broker has taken SecurAccess tokenless authentication for improving protection for user identification
 
Mobile protection from botnets and ransomware
Mobile computing security : 16 June, 2014
David Emms of Kaspersky Lab comments on the disruption of GameOver Zeus and CryptoLocker and the need for mobile users not to lower their guard
 
Online media protection agreement
Software Rights Management : 12 June, 2014
Sky Deutschland is using Digital Rights Management Fusion Agent software from Inside Secure for protecting video content delivery
 
Internet of Things generating greater threat exposure fears
Anti-virus and anti-malware software : 10 June, 2014
IT adminstrators have been surveyed by GFI Software about the level of threats through mobile devices created by the Internet of Things
 
Continuous monitoring and mitigation webinar
Network Security, Routers and Data Centres : 10 June, 2014
ForeScout Technologies sponsors SANS Webinar on the benefits of continuous monitoring and mitigation
 
Network security planning roadshow hits London in June
Network Security, Routers and Data Centres : 09 June, 2014
Tufin Technologies is bringing its Impact 2014 roadshow to London this month with information on network security planning for businesses
 
Strong authentication for cloud service providers
Authentication : 09 June, 2014
The Protiva Cloud confirm authentication system from Gemalto is compatible with HP CloudSystem for CSPs
 
UK Financial organisation security confidence surveyed
Data Protection : 09 June, 2014
Tripwire has released the conclusions of its survey into the confidence placed by UK financial organisations in the security controls they have in place
 
Mobile security and trusted authentication partnership
Mobile computing security : 06 June, 2014
Intercede and Good Technology have integrated their products for providing trusted authentication technology for BYOD users
 
USA takes action against botnet administrator
Anti-virus and anti-malware software : 06 June, 2014
Dell SecureWorks has provided details of the actions taken against Cyrptolocker ransomware and the Gameover Zeus botnet
 
Anti-virus company joins fight against cyber crime
Anti-virus and anti-malware software : 06 June, 2014
Bitdefender is offering its services to CERT and the police to enable them to use its experience in the escalating fight against cyber crime
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo