Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
2014 major cyber threats in review
Anti-virus and anti-malware software : 11 December, 2014
Kaspersky Lab looks back at the threat landscape of 2014 and the seriousness of fraud operations and corporate cyber espionage
Partnership provides security for SAP ERP users
Data Protection : 11 December, 2014
SAP has agreed on reselling the HP Fortify application for security protection and the identification of software vulnerabilities
Study examines vulnerabilities in social media
Anti-virus and anti-malware software : 11 December, 2014
Proofpoint has produced a study document that examines the threats posed by social media to both consumers and the business world
Serbian payment processor signs mobile payment agreement
Mobile computing security : 10 December, 2014
MeaWallet and Chip Card of Serbia have agreed on the supply of mobile payment and mobile wallet facilities in the region
McAfee predicts exploit developments in 2015
Anti-virus and anti-malware software : 10 December, 2014
After trust was shaken in 2014, McAfee now sees further internet trust related exploits as well as threats to privacy and the internet of things
Improved regulatory compliance ability through collaboration
Network Security, Routers and Data Centres : 10 December, 2014
OPSWAT and ForeScout collaborate on integration of IT security management and ControlFabric platforms for better regulatory compliance capabilities
Trusted Services Hub powers NFC payments in Taiwan
Finance and Banking Security : 09 December, 2014
Taiwan banks join trusted services hub powered by Gemalto for the security of mobile payments using Near Field Communications (NFC)
Default passwords create vulnerabilities for home routers
Anti-virus and anti-malware software : 09 December, 2014
Avast believes up to 75% of routers used in homes throughout the UK are vulnerable to attack because owners haven't changed the default passwords
Cyber threat summary of 2014
Anti-virus and anti-malware software : 09 December, 2014
Kaspersky Lab summarises the threats that businesses and individuals faced during the year as blocked attacks exceeded 2013 levels by more than a billion
Non-financial cyber attacks hold hidden costs
Anti-virus and anti-malware software : 08 December, 2014
Whilst around 50% of cyber attacks have attempted to steal money this year, other non-financial related attacks have also been linked to unforeseen expenses
Telecoms award for network security company
Mobile computing security : 08 December, 2014
AdaptiveMobile has been recognised in the award for network management excellence for its mobile network security services
2015 predictions for enterprise IT security
Anti-virus and anti-malware software : 08 December, 2014
Varonis provides its view of what 2015 will hold for enterprise IT security professionals as the fight against cyber crime gets tougher
2015 to see further evolution of DDoS attacks
Network Security, Routers and Data Centres : 05 December, 2014
Corero Networks predicts the IT security landscape for 2015, forecasting more sophistication in DDoS attacks and the rise of Internet-of-Things threats
Password rules pose challenges to online shoppers
Anti-virus and anti-malware software : 05 December, 2014
Kaspersky Lab discusses the difficulty faced by those doing their Christmas shopping on line when faced with numberous websites all requiring individual unique passwords
Encryption software for financial services
Data encryption : 04 December, 2014
Financial services company selects Becrypt encryption software for network security in compliance with National Planning Corporation standards
SMS based 2FA overcomes password laziness
Authentication : 04 December, 2014
Silvio Kutic, CEO at Infobip examines the problem of a lazy approach to password security and explains how SMS based two-factor authentication could be the answer
NFC SIM cards for mobile payments in Taiwan
Payment cards and e-commerce security : 03 December, 2014
A Taiwan operator has chosen Gemalto to provide SIM cards and software to enable secure payments using Near Field Communications (NFC) technology
Secure access to internal web applications
Authentication : 03 December, 2014
App Gateway from Centrify enables secure remote access to internal web applications without the need for a VPN
Financial institutions to be targeted in 2015
Anti-virus and anti-malware software : 02 December, 2014
Kaspersky Lab is predicting that cyber criminals will up the ante during the next year and target financial service providers themselves rather than their customers
Sony Pictures incident an attack of free speech
Data Protection : 02 December, 2014
Thales comments on the notion that attacking the arts industry by nation states as an objection to film contents could be an attack on the right to free speech itself
Online shopping fraud prevention advice
Payment cards and e-commerce security : 02 December, 2014
AlienVault is providing consumers with advice on how to avoid becoming the victims of online credit card fraud as the shopping season reaches its peak before Christmas
Access control for Citrix and Windows Terminal Server
Authentication : 02 December, 2014
Individual user level access control to sensitive data using Citrix and Windows Terminal Server now available with latest version of AppGate from Cryptzone
Total security for safeguarding all aspects of digital lives
Anti-virus and anti-malware software : 01 December, 2014
Kaspersky Lab explains the holistic approach it is now taking with the release of Total Security - Multi-Device to provide protection for all aspects of its customer's digital lives
Seamless and comprehensive IT protection
Anti-virus and anti-malware software : 01 December, 2014
BOX from Bitdefender has been designed to provide a comprehensive level of protection for PC systems, smart devices and mobile computing devices
UK consumers demand harsher penalties for data breaches
Data Protection : 01 December, 2014
Survey conducted by LogRhythm reveals the extent of frustration endured by UK consumers at data breaches suffered by organisations and the need for harsher penalties
Real time threat detection with GRC dashboard
Software Asset Management and Compliance : 01 December, 2014
The latest version of Huntsman from Tier-3 provides security managers with a live Governance Risk and Compliance dashboard as well as comprehensiv incident management capabilities
Encryption gateway secures sensitive customer information
Data encryption : 01 December, 2014
Fujitsu Communication Services is using encryption technology from Ciphercloud to protect sensitive customer information held using Salesforce
High capacity firewall appliance protects e-mail marketing company
Network Security, Routers and Data Centres : 27 November, 2014
An e-mail marketing company in Turkey has provided rule based network security with a high capacity firewall appliance supplied by Clavister
Advanced DDoS mitigation included in threat protection system
Network Security, Routers and Data Centres : 27 November, 2014
The latest release of the Thunder threat protection system from A10 Networks includes advanced DDoS mitigation capabilities and programmable policy engine
Encryption company celebrates a decade of success
Data encryption : 27 November, 2014
Zertificon is celebrating a decade of supplying central encryption gateways for corporate environments
Integrated network and content security
Network Security, Routers and Data Centres : 25 November, 2014
Barracude Security Suite provides integrated firewall, web filter and spam firewall within a single hardware appliance
Anatomy of the malicious Regin platform
Anti-virus and anti-malware software : 25 November, 2014
Kaspersky Lab provides some insight into Regin, established malware which attacks GSM networks with espionage campaigns
New firewall and UTM designed for growth in encrypted traffic
Network Security, Routers and Data Centres : 25 November, 2014
WatchGuard's latest firewall and unified threat management appliances have been designed to cope with the increased levels of encrypted traffic expected across corporate networks
ProtectV allows service providers to supply on-demand encryption for cloud storage
Data encryption : 25 November, 2014
With ProtectV technology, users of cloud storage products will be able to make use of encryption-as-a-service from their provider to increase the security of their data
Third quarter malware figures beat all records
Anti-virus and anti-malware software : 25 November, 2014
20 million + samples of malware were identified during the 3rd quarter with trojans being the most common type by far at over 78% of infections
UK and USA to collaborate on joint cyber crime initiative
Data Protection : 24 November, 2014
Cyber police exchange scheme could represent the start of a new approach in the fight against international cyber crime
Sandbox analysis report acclaims advanced threat prevention product
Anti-virus and anti-malware software : 24 November, 2014
Miercom tests Next Generation Threat protection and cloud based threat emulation service from Check Point with positive results
Security policy orchestration for multiple platforms
Data Protection : 24 November, 2014
Tufin adds Amazon web services support to its security policy orchestration suite providing centralised security policy management across platforms
UK troops advised to leave personal devices at home
Data Protection : 24 November, 2014
Fears of hacking have resulted in British troops being advised not to take personal computing equipment with them when deployed on exercises
Compromised privileged accounts key to advanced targeted attacks
Data Protection : 21 November, 2014
Study by CyberArk identifies privileged accounts as being central to the latest wave of advanced targeted attacks
Data recovery expert lists some of the lighter duties performed this year
Backup, Data Recovery and Disaster Recovery : 21 November, 2014
From dog-chewed USB sticks to drenched smartphones and an aggressive laptop user, Kroll Ontrack has helped them all recover data in 2014
Advice for securing vulnerable webcams
Data Protection : 21 November, 2014
Kaspersky Lab provides advice on preventing webcam snooping after website discovered which streams unprotected footage
Impact of allowing personal browsing on company computers
Internet Security and Content Filtering : 21 November, 2014
GFI Software research reveals the extent of the problem of allowing company employees to have unrestricted internet access on corporate devices
Facebook supercar scam could lead to identity theft
Anti-virus and anti-malware software : 21 November, 2014
Bitdefender is warning Facebook users of the dangers of scams involving false competitions and like-farming such as the recent Audi R8 false competition
Disaster recovery as a service partnership
Backup, Data Recovery and Disaster Recovery : 20 November, 2014
HP Enterprise Services and Symantec have agreed on a joint system for Disaster Recovery as-a-service for HP Helion OpenStack
Mobile networks provide opportunity for secure authentication
Authentication : 20 November, 2014
SecurEnvoy white paper describes the secure authentication options available for mobile device users
Managed security service for early threat detection
Data Protection : 20 November, 2014
Global threat intelligence at centre of portfolio of managed security services for early threat detection by Verizon
Application optimisation and security for SaaS providers
Internet Security and Content Filtering : 20 November, 2014
Web Performance Solutions product from Akamai is available for Software-as-a-Service providers to improve web application optimisation and security
Water authority improves IT network protection
Network Security, Routers and Data Centres : 20 November, 2014
ControlFabric architecture from ForeScout provides Sutton and East Surrey Water with integrated network and endpoint protection
The EU cyber taskforce should only be the beginning
Data Protection : 19 November, 2014
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo