Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Digital Rights Management on Android devices
Software Rights Management : 02 July, 2014
Intel based mobile devices running on the Android platform can now be protected from running illegal premium content using digital rights management technology
How cyber-criminals are exploiting the World Cup event
Internet Security and Content Filtering : 01 July, 2014
The EMEA Managing Director of Cisco, Graham Welch, explains why everyone should be on their guard when using internet connected devices to follow World Cup progress
Selfmite SMS work attacks smartphone users
Mobile computing security : 01 July, 2014
AdaptiveMobile warns of malicious app which propagates by SMS fooling users into installing a worm for infecting the user address book
Single smart credential for user validation
Authentication : 26 June, 2014
Cloud based single credentialing system helps reduce data breaches through strong user authentication available in a SaaS model
Connected home risk survey results
Network Security, Routers and Data Centres : 26 June, 2014
Fortinet reveals the greatest risks that homeowners face with the extension of the "internet of things" into the home environment
Cambridge sixth form college installs BYOD programme to increase network security
Network Security, Routers and Data Centres : 26 June, 2014
Long Road Sixth Form College in Cambridge, England, has selected ForeScout CounterACT to ease the roll-out of its bring your own device (BYOD) program by providing real-time visibility of what is connected to the network: devices - personal and mobile, applications and users. These factors, combined with broad infrastructure interoperability, have helped to increase the security of the Long Road's network, as well as the productivity of the students.
Montreal takes highest SMS spam levels in Canada
Mobile computing security : 25 June, 2014
Forthcoming anti-spam legislation in Canada could show a reduction in the high levels of SMS spam endured by mobile users in Montreal
Parking fine malware plagues UK
Anti-virus and anti-malware software : 24 June, 2014
Bitdefender is warning UK computer users of malware designed to steal confidential information through bogus parking fine reminder notices
Threat intelligence service integrated with network security platforms
Network Security, Routers and Data Centres : 24 June, 2014
Webroot's BrightCloud Security Services for Enterprise bring threat intelligence to organizations operating network security and management systems from certain suppliers
Tokenless two-factor authentication for VPN access
Authentication : 24 June, 2014
The virtual private network of The Lowry cultural centre at Salford Quays is being secured using tokenless two-factor authentication technology from SecurEnvoy
Managed service for application monitoring
Data Protection : 24 June, 2014
The Panda Advanced Protection Service takes proactive approach to security with automatic application classification and exploit detection
A quarter of attacks target web services and applications
Anti-virus and anti-malware software : 24 June, 2014
Threat data from NTT Com Security indicates levels of attacks being used to target web services and applications in the UK
18 percent of smaller businesses face Windows XP risks
Data Protection : 23 June, 2014
Research shows that large numbers of small and medium sized businesses are continuing to face malware attack risks by using the unsupported Windows XP operating system
Poor threat intelligence leads to growth in successful attacks
Anti-virus and anti-malware software : 23 June, 2014
Check Point reveals the growth in successful malware attacks resulting from increasing software sophistication and lack of threat intelligence
Network security company in Hot Companies and Best Product Awards finals
Network Security, Routers and Data Centres : 23 June, 2014
ForeScout's Rollins College network security platform installation has resulted in reaching the finals of the 2014 Hot Companies and Best Products Awards
Mobile identity platform for online access
Mobile computing security : 20 June, 2014
Operators of mobile services can offer subscribers a mobile identity system which can provide authentication for online services using a mobile phone
Mobile security and kill switch pre-installed on LG smartphone
Mobile computing security : 20 June, 2014
The latest LG G3 smart phone will benefit from pre-installation of Mobile Security from McAfee which includes an anti-theft kill switch feature
Advanced SIEM for improved detection rates
Data Protection : 19 June, 2014
NTT Com Security is improving the detection of unknown threats with its advanced security information and event management capabilities
Survey shows extend of unsuitable content on child mobiles
Internet Security and Content Filtering : 19 June, 2014
One out of every seven parents surveyed by BullGuard had found unsuitable content on the mobile devices belonging to their children
Fraud management for travel operators
Anti Fraud software : 19 June, 2014
The travel industry is now able to manage fraud more effectively due to partnership agreement between CyberSource and Amadeus
An Intelligent Approach to Fighting Cyber Attacks
Data Protection : 19 June, 2014
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime
NFC technology collaboration agreement
Software Rights Management : 16 June, 2014
Intel and Inside Secure have closed an agreement on intellectual property licences and the use of NFC technology
Tokenless authentication protects insurance broker
Authentication : 16 June, 2014
An insurance broker has taken SecurAccess tokenless authentication for improving protection for user identification
Mobile protection from botnets and ransomware
Mobile computing security : 16 June, 2014
David Emms of Kaspersky Lab comments on the disruption of GameOver Zeus and CryptoLocker and the need for mobile users not to lower their guard
Online media protection agreement
Software Rights Management : 12 June, 2014
Sky Deutschland is using Digital Rights Management Fusion Agent software from Inside Secure for protecting video content delivery
Internet of Things generating greater threat exposure fears
Anti-virus and anti-malware software : 10 June, 2014
IT adminstrators have been surveyed by GFI Software about the level of threats through mobile devices created by the Internet of Things
Continuous monitoring and mitigation webinar
Network Security, Routers and Data Centres : 10 June, 2014
ForeScout Technologies sponsors SANS Webinar on the benefits of continuous monitoring and mitigation
Network security planning roadshow hits London in June
Network Security, Routers and Data Centres : 09 June, 2014
Tufin Technologies is bringing its Impact 2014 roadshow to London this month with information on network security planning for businesses
Strong authentication for cloud service providers
Authentication : 09 June, 2014
The Protiva Cloud confirm authentication system from Gemalto is compatible with HP CloudSystem for CSPs
UK Financial organisation security confidence surveyed
Data Protection : 09 June, 2014
Tripwire has released the conclusions of its survey into the confidence placed by UK financial organisations in the security controls they have in place
Mobile security and trusted authentication partnership
Mobile computing security : 06 June, 2014
Intercede and Good Technology have integrated their products for providing trusted authentication technology for BYOD users
USA takes action against botnet administrator
Anti-virus and anti-malware software : 06 June, 2014
Dell SecureWorks has provided details of the actions taken against Cyrptolocker ransomware and the Gameover Zeus botnet
Anti-virus company joins fight against cyber crime
Anti-virus and anti-malware software : 06 June, 2014
Bitdefender is offering its services to CERT and the police to enable them to use its experience in the escalating fight against cyber crime
How to avoid becoming a GOZeus and Cryptolocker victim
Anti-virus and anti-malware software : 06 June, 2014
Kasperky Lab's David Emm provides some insignt into staying protected against the highly publicised GameOver Zeus and Cryptolocker threats
Perimeter security appliance for corporate networks
Network Security, Routers and Data Centres : 06 June, 2014
Panda releases the GateDefender eSeries version 5.50 including additional features for providing enhanced perimeter security on corporate networks
UK needs greater cyber-threat awareness
Anti-virus and anti-malware software : 05 June, 2014
IT security expert panel at InfoSecurity Europe event declares greater need for awareness of cloud computing and cyber security in UK businesses
BYOD security and compliance risk mitigation at large US college
Network Security, Routers and Data Centres : 05 June, 2014
Florida based Broward College employs ForeScout CounterACT for the security and management of all network-connected devices across its campuses
Identity management specialist invest in EMEA expansion
Authentication : 05 June, 2014
Centrify has invested in the development of the market in EMEA for Identity-as-a-Service with key appointments in the region
Short window to protect against Gameover Zeus
Anti-virus and anti-malware software : 03 June, 2014
Websense provides advice on protection against the Gameover Zeus malware which is expected to soon launch a significant attack
Social Media used in cyber-espionage campaign
Anti-virus and anti-malware software : 02 June, 2014
CyberArk comments on the use of social media by hackers to conduct cyber espionage campaign to spy on US officials
IT security discounts available for UK education sector
Anti-virus and anti-malware software : 02 June, 2014
Educational institutions in the UK can benefit from the Education Discount Policy being offered on IT security products by Cyberoam
Companies failing to reset password credentials of leavers
Authentication : 30 May, 2014
Study from Lieberman Software discovers over 13% of professionals in the IT security industry can still access the systems of former employers
Big data retrieval leading to increased burden on IT resources
Data Protection : 30 May, 2014
A study by Iron Mountain has shown that IT professionals are under increasing pressure to devote more time to the retrieval of data
Operating in zero trust environments
Network Security, Routers and Data Centres : 30 May, 2014
Dr Wieland Alge, Vice President and General Manager EMEA Barracuda Networks discusses zero trust environment infrastructures and the role of the CIO
Brazilian network security partnership
Network Security, Routers and Data Centres : 28 May, 2014
Clavister enters partnership to provide public sector and private industry clients with advanced IT security systems in Brazil
Game producer consults IT security experts on plot authenticity
Anti-virus and anti-malware software : 28 May, 2014
Kaspersky Lab has been helping entertainment supplier Ubisoft to authenticate adventure-game plot involving the exploits of a hacker
Risk-based authentication supplier acquisition
Authentication : 28 May, 2014
Vasco is expanding into fraud detection and risk based authentication with the acquisition of Risk IDS
Mobile app for secure single sign-on access
Mobile computing security : 27 May, 2014
Apple and Android mobile computing users can now access corporate resources securely with single sign-on access from Ping Identity
Network security product wins US government award
Network Security, Routers and Data Centres : 27 May, 2014
CounterACT from ForeScout Technologies has achieved gold status in the 2014 Govies Government Security Awards
App lock provides greater security for Android users
Mobile computing security : 23 May, 2014
Mew mobile security module enables Android smartphone users to control access to the phone's apps
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo