Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
IT Security
Real time detection of unauthorised computer activity
Software Asset Management and Compliance : 12 September, 2013
The Data Governance suite from Varonis provides companies with the ability to detect potential breaches and unauthorized changes in real time
 
Privileged access compliance at Bouygues Telecom
Data Protection : 12 September, 2013
French telecommunications provider is protecting itself and its customer data with the management of privileged access credentials.
 
Cyber espionage campaign attacks South Korea
Data Protection : 12 September, 2013
Companies in the Republic of Korea are under attack from cyber criminals according to research and analysis conducted by Kaspersky Lab
 
DDoS attacks plague online gaming communities
Anti-virus and anti-malware software : 11 September, 2013
Game servers being used to channel DDoS attacks on financial services providers using reflection and amplification techniques
 
PHP application exploits affect internet general well-being
Internet Security and Content Filtering : 10 September, 2013
Report from Imperva investigates the use of PHP SuperGlobal parameters by hackers and how they are affecting the integrity of the internet
 
Hardened Android tablet computer with additional security
Data Protection : 10 September, 2013
Getac and Becrypt are presenting a rugged Android tablet at DSEI 2013 with additional security suitable for government and defence markets
 
Council workers to use two-factor authentication for remote access
Authentication : 10 September, 2013
2FA to replace hardware tokens at Chorley Council improving secure access rights to council systems for employees working remotely
 
Breached NSA documents may be due to breached encryption
Data Protection : 09 September, 2013
Voltage security comments on the need for properly implemented encryption solutions to prevent data from falling through the cracks
 
SMS with malicious link spreads Android trojan
Mobile computing security : 09 September, 2013
Kaspersky has been tracking the Obad.a Trojan for Android devices discovering novel and effective distribution method
 
Small organizations just as vulnerable as corporates
Data Protection : 06 September, 2013
Check Point discusses the significance of company size relating to the need for strong IT security and concludes that smaller companies are just as vulnerable
 
Heperbot trojan targets online banking users
Anti-virus and anti-malware software : 06 September, 2013
Advanced Trojan focuses on online banking users in European and Asian countries supported by credible looking e-mail phishing campaigns
 
Cloud based IT management services includes free asset tracking
Software Asset Management and Compliance : 06 September, 2013
GFI Software is enabling smaller companies to have free auditing and asset management capabilities as part of cloud based IT management services in GFI Cloud Suite
 
IT risks being filtered from senior management reports
Data Protection : 06 September, 2013
Survey from Tripwire indicates more than half of IT security professioinals are filtering information to hide negative facts from corporate management teams
 
Secure mobile file sharing for Windows phone 8
Mobile computing security : 05 September, 2013
Accellion addresses secure BYOD for Windows phone 8 users with secure mobile file sharing and collaboration
 
API Server for improved governance
Software Asset Management and Compliance : 05 September, 2013
API management and SOA governance integrated in the latest version of Axway API Server for data flow management
 
Multi-device internet security brings safer social networking
Internet Security and Content Filtering : 05 September, 2013
Kaspersky Internet Security now covers multiple devices including mobiles to mitigate the risk associated with multiple access on social networking sites
 
A fifth of website visitors suffer password amnesia
Data Protection : 04 September, 2013
Complex web forms and too many password based log-in processes are frustrating consumers according to research from Ping Identity
 
State-sponsored IT attacks predicted to get worse
Data Protection : 04 September, 2013
Lieberman Software has been polling attendees at Black Hat USA with the pessimistic result that cyber attacks sponsored by countries are likely to increase
 
Low confidence levels shown in Digital Reform Agenda
Data Protection : 03 September, 2013
UK Government security-by-default approach gains little enthusiasm with more consideration needed to be given to cyber-security as part of the digital reforms
 
Commercial IT security policies underfunded
Data Protection : 03 September, 2013
Members of the IT profession have indicated their belief that neither enough time nor money is available for the development of robust IT security policies in their companies
 
Security app upgrades required prior to iOS 7 release
Mobile computing security : 03 September, 2013
Apple is soon to release the latest version of its mobile operating system with major changes to the way in which security is handled with some security apps being predicted to be inoperable on the new version
 
Tenable security apps for advanced threat identification
Network Security, Routers and Data Centres : 02 September, 2013
SecurityCenter 4.7 from Tenable Network Security now includes a catalogue of the company's apps available for advanced threat identification
 
Unified Threat Management for Windows Azure
Unified Threat Management : 02 September, 2013
WatchGuard releases Unified Threat Management for use with cloud computing based on the Windows Azure platform
 
ICO views on encryption paint incomplete picture
Data Protection : 02 September, 2013
Voltage security comments on ICO encryption analysis which the company believes to be incomplete
 
Mature cloud security contributing to market growth
Cloud Computing Security : 30 August, 2013
Zscaler comments on the forecast growth in the platform-as-a-service market with respect to improvements in cloud security and policy enforcement practices
 
EU companies fear reputation damage with security breach revelations
Data Protection : 30 August, 2013
A survey conducted among EU companies reveals attitudes towards IT security breach revelation with 2% willing to make such breaches public, fearing damage to brand or reputation
 
NYT hack initiated through third party services
Data Protection : 29 August, 2013
Imperva comments on the hacking of the New York Times with reference to the role played by 3rd party service providers such as the ISP
 
Secure BYOD for universities
Network Security, Routers and Data Centres : 29 August, 2013
Forescout is preparing educational institutions for the new academic year by providing flexible network access control that facilitates a secure BYOD environment
 
Improved power on content security appliance
Network Security, Routers and Data Centres : 29 August, 2013
The WatchGuard XCS 880 benefits from increased processing power, doubling throughput whilst reducing energy on content security appliance
 
DDoS Attacks being used to camouflage fraud attacks
Data Protection : 29 August, 2013
Prolexic issues threat advisory warning of increased fraud and identity theft attakcs being masked by DDoS attacks
 
Digital reforms require built-in security
Data Protection : 28 August, 2013
Thales comments on the identity theft of British citizens and the need for tighter security during digital reformation
 
Cloud backup with longer retention
Backup, Data Recovery and Disaster Recovery : 28 August, 2013
Barracuda Backup now features extended cloud storage and longer retention periods without the need for dedicated local appliance
 
Privacy protection for Android devices
Mobile computing security : 28 August, 2013
Anroid smartphone users now have access to Bitdefender Mobile Security for enhanced privacy protection and malware detection
 
Advice on preventing internal cyber attacks
Data Protection : 28 August, 2013
SecureWorks is providing advice on the prevention of cyber attacks originating from hacktivists and disgruntled employees
 
Mobile VPN client for Windows and OSX
Mobile computing security : 27 August, 2013
Partnership with NCP Engineering results in simplified mobile VPN connectivity with two-factor authentication support
 
Industry lacks mobile device security policies
Mobile computing security : 27 August, 2013
Study by Kaspersky Lab shows that almost half of companies have no policy on the secure use of mobile devices on their networks
 
DRM protection for Korean chip manufacturer
Software Rights Management : 27 August, 2013
Inside Secure is protecting the intellectual property of Telechips of Korea with DRM Fusion Agent solution for digital rights management
 
AV-Comparatives success for ESET
Anti-virus and anti-malware software : 23 August, 2013
ESET gains top position in AV-Comparatives anti-phishing report with a 99 percent success rate on blocking phishing websites
 
Data protection combined with mobile device loss prevention
Mobile computing security : 23 August, 2013
Mobile Premium from Avast is available for Android devices and features geofencing as a device loss prevention technology
 
Secure authentication for network attached mobile devices
Authentication : 22 August, 2013
ESET Secure Authentication ensures secure access for mobiles to company networks with the use of two-factor authentication (2FA) using a one-time password
 
Free tool detects Poison Ivy infections
Anti-virus and anti-malware software : 22 August, 2013
FireEye releases report demonstrating resurgence of Poison Ivy eight years on from its creation and releases free tool for assessing possible infections
 
Virus scanning solution for Mac users
Anti-virus and anti-malware software : 22 August, 2013
Bitdefender releases Antivirus for Mac plus associated app for use on Mac OS X platforms including web traffic filtering and anti-phishing
 
Holistic approach to cyber security needed
Data Protection : 22 August, 2013
Thales comments on the need to match technology to people and processes to provide effective cyber protection in light of the alleged hack on Foxtons estate agent
 
Secure mobile cloud sharing for the legal industry
Mobile computing security : 21 August, 2013
The legal industry is increasingly turning to private cloud file sharing solutions for secure mobile access to manage sensitive case related information
 
Security software blocks vehicle control systems hack
Data Protection : 21 August, 2013
Kobil has proven its ability to prevent hackers from accessing and manipulating vehicle on-board computers at the Defcon Hacker conference in the USA
 
T-Series appliances protect increasingly complex networks
Network Security, Routers and Data Centres : 21 August, 2013
Tufin is addressing the increased complexity of corporate networks incorporating virtualisation and IPv6 with a new set of network security appliances
 
Control software delivers insight into security risks
Data Protection : 21 August, 2013
ControlInsight and UserInsight from Rapid7 have been launched to provide security managers with greater effectiveness in the management and reduction of IT security risks
 
Cloud security and data governance
Software Asset Management and Compliance : 19 August, 2013
Varonis comments on Forrester report on PRISM revelations in the context of applying good data governance in cloud computing environments
 
Study shows low use of auditing to identify security risks
Data Protection : 16 August, 2013
Lack of audits and misalignment of spending against risk result in lack of information in UK companies about how to reduce IT security risks
 
Understanding risk in virtualized environments
Cloud Computing Security : 16 August, 2013
Frederik Bijlsma of Red Hat explores virtualization and how reducing uncertainty and understanding exposures can bring about improvements in risk management
 
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com