Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
IT Security
Dashboard provides display of network security vulnerabilities
Network Security, Routers and Data Centres : 15 October, 2013
Tenable has delivered its SecurityCenter enterprise software to SAI Global bringing improved visibility through dashboard view of network vulnerabilities
Industry report reveals extent of latest spam outbreak
Mobile computing security : 14 October, 2013
The end of the summer has seen a surge in levels of social media spam with the most prolific producers in Europe, according to a new AppRiver report
Tamper-proof jailbreak detection for mobile devices
Mobile computing security : 14 October, 2013
Designed for mobile devices used in enterprise environments, new jailbreak detection software protects companies from fraud and data loss
Onling gambling company takes IT infrastructure security protection
Data Protection : 14 October, 2013
Session and transaction analysis from ExtraHop's Context and Correlation Engine provides improved IT security for online gambling site
Partnership eases PCI DSS compliance
Software Asset Management and Compliance : 14 October, 2013
Mako Networks joins compliance company to provide simplified regulatory compliance for payment card data security
Web protection service added to cloud
Cloud Computing Security : 11 October, 2013
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Encryption specialist joins technology alliance partnership
Data Protection : 11 October, 2013
The DESlock encryption company is the first partner to join ESET's recently formed technology alliance programme
Advice on protecting company information for travelling workers
Data Protection : 11 October, 2013
Iron Mountain has provided some advice for people who work while using public transport on how to protect sensitive information from commuter snoopers
Education software protected from DDoS attacks
Data Protection : 11 October, 2013
Software as a service supplier for the education market is protecting DDoS mitigation services from Prolexic to prevent down time
NFC payment system meets industry security standards
Mobile computing security : 10 October, 2013
Inside Secure has been working with LoopPay to develop the security technology needed to meet the requirements of mobile commerce security in retail environments
Secure PDF annotation for mobile users
Mobile computing security : 10 October, 2013
A secure app for iOS mobile devices has been developed by Accellion for the secure annotation of PDF files
Industry magazine awards best buy status to CounterACT
Network Security, Routers and Data Centres : 09 October, 2013
ForeScout's network access control system CounterACT has received a five-star rating and best buy status in SC Magazine product evaluation
Your CMS is the path of least resistance for industrial hackers
Data Protection : 09 October, 2013
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
Firefox extension detects cross-site scripting
Internet Security and Content Filtering : 09 October, 2013
Free Immuniweb Self-Fuzzer tool for Firefox seeks out vulnerabilities to Cross-Site Scripting or SQL-injection
Adobe breach could compromise software code
Data Protection : 07 October, 2013
Attackers have gained access to source code of Adobe products putting millions of users at risk of zero-day attacks
Taxi management system takes FortiGate network protection
Network Security, Routers and Data Centres : 04 October, 2013
FortiNet is protecting the taxi booking and payment system in use by a large taxi company operating in central London
Advanced port control for workstations and servers
Network Security, Routers and Data Centres : 04 October, 2013
CAPS certification given to the Advanced Port Control system from Becrypt for operation on a number of platforms including Windows Server
Companies collaborate on fraud prevention
Anti Fraud software : 02 October, 2013
Iovation and Equifax has got together on the development of a portfolio of products aimed at providing multi-layered fraud protection
Combined network and endpoint protection on show
Network Security, Routers and Data Centres : 02 October, 2013
Gateprotect is travelling to Dubai to demonstrate its latest protective technology for both endpoints and the network
Complex distributed network security
Network Security, Routers and Data Centres : 02 October, 2013
Peakflow SP network intelligence tool gains greater scalability for managing security on complex distributed IT networks
Simplified IT security compliance with 2013 release of ISO 27001
Software Asset Management and Compliance : 02 October, 2013
Compliance consultants laud the release of ISO 27001:2013, proclaiming it to provide greater simplification in attaining compliance
Collaborative project initiated for improved IT security
Data Protection : 01 October, 2013
The Community Open Data Initiative has been launched as a means of engaging security professionals in collaborating in the fight against cyber crime
Investigation into Yahoo bug bounty program
Anti-virus and anti-malware software : 01 October, 2013
Professional security researchers have been delving into the workability of Yahoo's bug bounty program for rewarding users who identify vulnerabilities and security exposures
Security intelligence collaboration for big data
Network Security, Routers and Data Centres : 01 October, 2013
Integration between CounterACT and Splunk Enterprise provides improved insight into threats and automatic control in big data environments
Report details national cyber-attack characteristics
Data Protection : 01 October, 2013
FireEye delves into the national psyche of the most advanced cyber attacks to build a profile of attack methods expected from different regions of the world
Secure mobile payment system on show at Las Vegas event
Finance and Banking Security : 01 October, 2013
Apriva is attending Money2020 in Las Vegas this year with its transaction handling application for mobile devices based on iOS and Android platforms
Two-thirds of e-mail traffic unsolicited
Anti-virus and anti-malware software : 30 September, 2013
Spam dominated e-mail traffic during August with no easing of phishing mails during the holiday season
Hackers create work-around for iPhone biometrics
Data Protection : 30 September, 2013
David Shear and Joe Stewart of Dell Secureworks recommend basic security measures to secure iPhones regardless of whether or not they're equipped with Touch ID biometrics
DDoS concentration risk response
Data Protection : 27 September, 2013
DDoS SWAT has been launched to provide companies with protection during sustained multiple distributed denial of service attacks
Supply chain attacking APT discovered
Anti-virus and anti-malware software : 27 September, 2013
Kaspersky Lab provides details of the Icefog advanced persistent threat (APT) aimed at disrupting Western supply chains
Personal cloud appliances threaten corporate security
Cloud Computing Security : 26 September, 2013
Varonis has been studying the use of personal cloud services by employees for storing items relating to work, thereby creating security risks
Survey shows lack of confidence in detecting attacks
Data Protection : 26 September, 2013
Over half of IT security professionals surveyed aren't confident that attacks could be reliably detected within their organisations
Cloud computing platform gains NG firewall protection
Network Security, Routers and Data Centres : 25 September, 2013
NEC software's virtual data centre automation cloud platform will be protected by the FortiGate next generation firewall
Games manufacturer takes BYOD inspection and security
Network Security, Routers and Data Centres : 25 September, 2013
The BYOD security system in use at SEGA corporation is based on ForeScout's CounterACT network access control technology
Balancing staff acquisition with IT security requirements
Data Protection : 24 September, 2013
Raj Samani of McAfee explains the steps needed to secure information assets in small businesses from insider threats when recruiting new staff
OS root kit detector available for Mac OSX
Anti-virus and anti-malware software : 24 September, 2013
Security tool from ESET available for Apple Mac users which detects malicious software that tries to infect the operating system
Cyber security self-assessment available online
Software Asset Management and Compliance : 24 September, 2013
IT Governance is enabling companies to assess their security position simply with the use of a new online self-assessment questionnaire
Cashless vending security on show at Canadian event
Payment cards and e-commerce security : 24 September, 2013
Apriva is attending the Canadian Automatic Merchandising Association event to demonstrate its software for securing cashless vending transactions
Hardware features in latest bank hacking attempt
Finance and Banking Security : 23 September, 2013
Kaspersky Lab comments on the use of a combination of hardware and software to gain access to customer records at Barclays bank
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Data Protection : 20 September, 2013
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Is biometric authentication reliable enough for payment security?
Authentication : 20 September, 2013
Andy Kemshall of SecurEnvoy examines the trend towards the use of biometrics for consumer authentication and explains how it isn't yet mature enough to cope with the high reliability needs of the payment industry
Best practice guide for DDoS protection
Anti-virus and anti-malware software : 20 September, 2013
A guide is available for understanding the best industry practices for protecting e-commerce web sites from the perils of Distributed Denial-of-Service (DDoS) attacks
Multi-device internet security protection
Internet Security and Content Filtering : 20 September, 2013
With the discovery that data is more valuable than devices to IT consumers, Kaspersky Lab is now offering multi-device internet security protection
Best practice guidelines for public sector cyber security
Data Protection : 19 September, 2013
A report is being released on operating securely in the digital world, offering best practice guidelines for mitigating IT risks in the UK public sector
Secure file sharing available on enterprise protection
Data Protection : 19 September, 2013
Becrypt has combined the conflicting areas of data loss prevention with secure file sharing on one product with mShare for enterprise data protection
Time to resolve security attacks of significant concern
Data Protection : 19 September, 2013
Survey from forensics specialist Guidance Software shows that a third of IT security professionals believe the time to resolve attacks to be the number one concern
Fraud protection on anonymous internet transactions
Anti Fraud software : 18 September, 2013
Iovation releases add-on for reputationManager to reduce fraud on anonymous proxy servers which have shown to be 30 times risker than transactions that are not performed anonymously
Policy management software for maintaining compliance
Software Asset Management and Compliance : 17 September, 2013
Tripwire's enterprise policy management draws on main industry standards and regulations to reduce security exposures and ensure compliance
Policy compliance software integrated with privileged account management
Data Protection : 17 September, 2013
Lieberman and Qualys have integrated their products for enterprise password management with vulnerability management and policy compliance
Passive vulnerability scanner available as standalone product
Network Security, Routers and Data Centres : 16 September, 2013
Tenable Network Security is providing broader availability of its Passive Vulnerability Scanner for corporate networks
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012