Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Google data privacy policy re-write an example for all
Data Protection : 03 February, 2015
Sue Trombley of Iron Mountain explains the implications of the ICO's pressure on Google to re-write its data privacy policy
 
Network Access Control market report recognises ForeScout as having largest deployments
Network Security, Routers and Data Centres : 03 February, 2015
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
 
Threat of increased untrusted certificate use
Anti-virus and anti-malware software : 02 February, 2015
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software
 
Award recognition for anti-virus product
Anti-virus and anti-malware software : 02 February, 2015
AV-Comparatives have chosen Bitdefender for its product of the year title for the second year in succession
 
Beyond access control with next-generation NAC
Network Security, Routers and Data Centres : 02 February, 2015
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications
 
The real consequences of a DDoS attack
Anti-virus and anti-malware software : 30 January, 2015
Kaspersky Lab explains how a DDoS attack can have serious financial and operational consequences on the target organisation
 
Central management and application control on new firewall
Network Security, Routers and Data Centres : 29 January, 2015
The latest addition to Clavister's Wolf series of firewall appliances provides full control and management for entry-level enterprise security
 
Privileged account management growth in 2014
Authentication : 29 January, 2015
BeyondTrust reflects on a year of growth during 2014 in both privileged account and vulnerability management as customer demand increases
 
DDoS Security as a Service implementation
Data Protection : 28 January, 2015
Joe Eskew of NSFOCUS explains the three steps required for implementing DDoS Security as a Service technology for protection against attacks
 
Continuous recording capability for endpoint threat detection
Anti-virus and anti-malware software : 28 January, 2015
The latest release of Carbon Black provides continuous endpoint recording and live incident response through remote connection throughout the enterprise
 
Research into social media use in education
Internet Security and Content Filtering : 28 January, 2015
Bloxx study shows high levels of cyber-bullying, inappropriate behaviour and productivity problems associated with the use of social media in educational environments
 
Higher education IT security recognition for two products
Network Security, Routers and Data Centres : 28 January, 2015
CounterACT and ControlFabric have achieved recognition for successful deployment within higher education
 
Skimming detection device for ATMs
Finance and Banking Security : 23 January, 2015
A bank in Qatar is now able to detect card skimming attempts as well as capturing a facial image of the culprit using new software from iOmniscient
 
Secure billing system for digital magazine distributor
Payment cards and e-commerce security : 23 January, 2015
French distributor selects Netsize from Gemalto for secure online billing operations for digital downloads using mobile payments
 
Secure online services for Turkish bank
Finance and Banking Security : 23 January, 2015
Halkbank of Turkey is improving security for its internet and mobile banking clients with the introduction of security technology from Kobil Systems
 
Can biometrics replace passwords
Authentication : 22 January, 2015
Infobip explains the role of biometrics as a secure authentication method if used with a second identification factor
 
Data centre migration challenges
Network Security, Routers and Data Centres : 22 January, 2015
Security and compliance feature in the key three considerations for successful migration of data centres
 
Reducing enterprise password management risk
Data Protection : 22 January, 2015
Pooled service account rotation feature in Enterprise Random Password Manager reduces risks and disruptions when dealing with privileged accounts
 
Enhanced cyber threat detection and response
Data Protection : 22 January, 2015
New Case Management and advanced search features provide IT security personnel with improved detection and response capabilities for cyber threats
 
Secure payment platform for non-profit market
Payment cards and e-commerce security : 20 January, 2015
Security-as-a-Service platform from Alert Logic will protect large volumes of online transactions being performed by Valldata for the non-profit segment in the UK
 
Leaked picture fraud takes hold on Facebook
Internet Security and Content Filtering : 19 January, 2015
Bitdefender is warning users of social network sites not to be duped into falling for the latest viral or trending snapchat leaks
 
Device sharing risk for mobile users
Mobile computing security : 19 January, 2015
Survey results show mobile device owners are taking considerable risks in openly sharing their internet enables smartphones and tablets
 
Modular Tier III data centre to be built in The Netherlands
Network Security, Routers and Data Centres : 15 January, 2015
Datacentre design and operating company, ICTroom will provide a modular, Tier III facility for Cegeka to be operational in June this year
 
Social media security compliance for business networking site
Anti-virus and anti-malware software : 15 January, 2015
Business social media networking site, LinkedIn has chosen Proofpoint to become a certified compliance partner for the protection of branded accounts
 
Old Android versions need upgrading to remain safe from cyber threats
Mobile computing security : 15 January, 2015
Bitdefender explains why users of older versions of the Android smartphone platform may be vulnerable unless they perform an upgrade
 
SMS spam abuse spreads to new channels
Mobile computing security : 15 January, 2015
AdaptiveMobile explains how the abuse of the SMS messaging service is now spreading to adopt new channels
 
AMD provides open source firewall power
Network Security, Routers and Data Centres : 14 January, 2015
The OPNsense firewall appliance makes use of the AMD G-Series SOC for network security
 
Network visibility improvements for large healthcare trust
Network Security, Routers and Data Centres : 14 January, 2015
A healthcare provider in Northern Ireland has solved the problem of increasing numbers of non-managed endpoints on its network with CounterACT technology from ForeScout
 
Centralised security for mail serviers
Data Protection : 14 January, 2015
GFI MailEssentials 2015 is now available for management and security of multi mail servers
 
Human factors in corporate cyber security
Data Protection : 13 January, 2015
Cisco explains how the insider threat isn't necessarily malicious but stems from employees unwittingly putting corporate data at risk
 
Data privacy in the internet of things
Data Protection : 13 January, 2015
Telit Wireless explains how it is protecting consumers from threats in embedded computing on the back of large numbers of IoT announcements at CES 2015
 
Data privacy protection for investment management company
Data Protection : 12 January, 2015
Campbell Global is using DatAdvantage and IDU Classification Framework from Varonis for ensuring the security and privacy of its data
 
To stay safe from cybercrime small firms need to stop thinking like consumers
Anti-virus and anti-malware software : 12 January, 2015
Kaspersky Lab examines the cyber security dilemma of smaller companies and shows how they need to start emulating larger firms in their approach to data security
 
Learning lessons from 2014 threats for a secure new year
Internet Security and Content Filtering : 08 January, 2015
2015, when companies will realise they aren’t 100% secure, and consumers will begin to take care of their own security business
 
Enterprise security will become a business challenge in 2015
Data Protection : 08 January, 2015
Rob Lay, Solutions Architect for Enterprise and Cyber Security in UK & Ireland at Fujitsu explains the growing challenges associated with enterprise security
 
Reducing Cyber Risk with Trustworthy Best Practices
Data Protection : 08 January, 2015
Ed Paradise, Vice President of Engineering at Cisco explains industry best practice for cyber risk reduction
 
Mobile encrypted communications
Data encryption : 08 January, 2015
Thales explains how the use of encryption enables mobile communication networks to be used securely
 
Awards recognize success using ForeScout products
Network Security, Routers and Data Centres : 08 January, 2015
ForeScout Technologies has awarded customers for game changing, creative and innovative deployments of its products
 
Healthcare trust increases IT security spending
Anti-virus and anti-malware software : 06 January, 2015
Budgets on securing data and IT systems at Yeovil District Hospital have increased significantly during the last two years.
 
Gartner magic quadrant accolade for network access control supplier
Network Security, Routers and Data Centres : 06 January, 2015
ForeScout Technologies maintains its leadership position in Gartner's magic quadrant for network access control for the fourth year running
 
Open source firewall initiative launched
Network Security, Routers and Data Centres : 05 January, 2015
Deciso has launched OPNsense to provide an open source extended set of features for firewall users
 
Lessons learned from 2014, the year of the breach
Anti-virus and anti-malware software : 05 January, 2015
Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked.
 
IT security review of 2014
Anti-virus and anti-malware software : 05 January, 2015
Arbor Networks re-examines 2014 and explains how lessons can be learnt to prevent similar IT security problems in 2015
 
Lessons learned from 2014 – The year of the breach
Anti-virus and anti-malware software : 18 December, 2014
Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked.
 
Alliance agreement to combat advanced threats
Anti-virus and anti-malware software : 17 December, 2014
Tripwire has entered into a partnership with Check Point to provide innovative products to combat advanced persistent threats
 
Security trends to worry about and some to ignore
Network Security, Routers and Data Centres : 15 December, 2014
WatchGuard Technologies provides its forecast for 2015 with five worrying trends and five things which IT professionals should strike from their worry list
 
Hybrid security for UK healthcare trust
Network Security, Routers and Data Centres : 15 December, 2014
The Royal Cornwall Hospitals NHS Trust has opted for a hybrid approach to the provision of holistic IT security
 
From fiction to reality: tackling the cyber threats of tomorrow
Anti-virus and anti-malware software : 15 December, 2014
Kirill Slavin, general manager at Kaspersky Lab UK&I examines the future of IT security and the rise in significance of the internet of things
 
Wireless network security for Brazilian smart city project
Network Security, Routers and Data Centres : 15 December, 2014
Clavister is providing secure wireless network infrastructure for part of smart city projects being undertaken in Brazil
 
Large scale zero-day attack predictions for 2015
Network Security, Routers and Data Centres : 15 December, 2014
Extrahop Networks is providing its predictions for enterprise IT security professionals for next year
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo