Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
IT Security
Internet of things comes under focus in 2014 predictions
Data Protection : 20 December, 2013
WatchGuard provides its take on what to expect in 2014 including the increasing prominence of the internet of things
Phishing attempts plague UK office workers
Data Protection : 19 December, 2013
Phishme study shows that office employees in the UK are seeing an increasing quantity of phishing e-mails on a daily basis
Global hotel takes next generation firewall protection
Network Security, Routers and Data Centres : 19 December, 2013
McAfee is providing the Stonesoft next generation firewall products for the protection of global IT systems at Accor hotels
Storage technology improvements change data recovery landscape
Data encryption : 19 December, 2013
Kroll Ontrack shows how changes made during 2013 in storage technology have altered the methods needed for effective data recovery
Desktop sized firewall for small businesses
Network Security, Routers and Data Centres : 18 December, 2013
Low cost next-generation firewall released to provide application control and content security for smaller businesses
Data protection and disaster recovery acquisition
Backup, Data Recovery and Disaster Recovery : 18 December, 2013
Unitrends strengthens its positioin in data protection and disaster recovery with the acquisition of PHD Virtual Technologies
Lack of security puts mobile shoppers at risk
Mobile computing security : 18 December, 2013
Online shoppers using mobile handsets have been found to be unprotected from identity and credit card fraud in survey conducted by Tripwire
Enterprise IT predictions for 2014
Data Protection : 18 December, 2013
Varonis looks ahead to 2014 and provides its insight into the way IT in the enterprise will develop its protective capabilities
Survey results show ROI satisfaction on network access control
Network Security, Routers and Data Centres : 17 December, 2013
Network access control customers of ForeScout have been surveyed on satisfaction of product performance and return on investment
SMS message stealing Android malware discovered
Mobile computing security : 17 December, 2013
MisoSMS malware active in China and Korea has been discovered which steals SMS text messages from Android devices
Image tracking implications of Gmail automatic image display
Internet Security and Content Filtering : 17 December, 2013
Rapid7 comments on the new automatic image display feature in Gmail and the implications regarding e-mail tracking and malicious request proxying
IT security trends for 2014
Anti-virus and anti-malware software : 16 December, 2013
Panda Security is predicting a significant increase in the amount of malware created during 2014
More clarity required in Google secure internet access plans
Internet Security and Content Filtering : 16 December, 2013
Bloxx is calling on internet giant Google to provide more details about how its uProxyService is likely to work when launched in 2014
Lack of time hampers fight against security vulnerabilities
Data Protection : 16 December, 2013
Survey from RedSeal Networks show almost a third of IT departments are too busy or lack the resources to keep their networks secure
Video conference service enters security alliance programme
Data Protection : 13 December, 2013
Zoom Video Communications joins Centrify Alliance partner programme to make use of web and mobile single sign-on for improved security
Enterprise secure collaboration system
Data Protection : 12 December, 2013
Secure file-sharing and collaboration capability enhanced with improved user authentication options and DFS support
Cloud based privileged identity management for data centres running Azure
Cloud Computing Security : 12 December, 2013
Enterprise Random Password Manager now provides privileged identity management for Windows Azure cloud data centres
Database as a service plaform for malware
Data Protection : 12 December, 2013
Hacker intelligence initiative report reveals the use of database as a service technology as a new cyber-criminal malware platform
Digital degree certificates prevent counterfeiting
Anti Fraud software : 11 December, 2013
The University of Malaya is counteracting fraud and the counterfeiting of degree certificates with the use of Thales hardware security modules and time stamp servers
Automated threat response collaboration
Network Security, Routers and Data Centres : 11 December, 2013
Real time threat intelligence and automatic advanced malware mitigation result from collaboration between Bromium and ForeScout
Integrated security management collaboration
Data Protection : 11 December, 2013
Stonesoft and Tufin Technologies have entered into a collaboration for integrating contextual awareness with policy orchestration for improved IT security management
Database security experts become participating organization in PCI Council
Payment cards and e-commerce security : 11 December, 2013
DB Networks to become involved in card payment standard setting process as a participating organization with the PCI security standards council
Secure managed file transfer including large files
Data encryption : 10 December, 2013
The Z1 SecureHub has been updated to include usability improvements and the handling and quarantine of detected malware
Cloud based spam protection milestone
Anti-virus and anti-malware software : 10 December, 2013
The Cloud based antispam gateway from Comodo has reached a milestone having filtered its 50 millionth e-mail
Assurance report completed on European data centres
Network Security, Routers and Data Centres : 10 December, 2013
Data centres in Europe operated by Interoute have undergone risk assurance audits from PriceWaterhouseCooper
Support for System Center 2012 R2 configuration manager
Anti-virus and anti-malware software : 10 December, 2013
Shavlik to provide patches for System Center configuration manager as part of the Microsoft Alliance Programme
Report on targeted attack detection
Data Protection : 10 December, 2013
Trusteer comments on the methods of detecting targeted attacks and the state of readiness of IT professionals to deal with advanced threats
Fight against financial crime continues to escalate
Finance and Banking Security : 09 December, 2013
Survey shows that spending on preventing financial crime is continuing to be a priority as global risks continue to increase
Cyber security technology to share same footing as armaments
Data Protection : 09 December, 2013
Thales comments on revelations that Western Governments are due to reach agreements on the status of sensitive cyber security technologies
Cloud based security system acquisition
Cloud Computing Security : 09 December, 2013
Akamai is extending its expertise into cloud based data centre and enterprise protection through the acquisition of Prolexic
US security certification for Centrify Server Suite
Data encryption : 06 December, 2013
Secure authentication and access control server suite from Centrify achieves common criteria certification enabling its use in government agencies
Large increase in mobile device use for holiday shopping
Mobile computing security : 06 December, 2013
The main online purchasing period during the US holiday season showed a 150% increase in mobile device usage in 2013 with 0.5% of all transactions being fraudulent
Combatting Cyber-Attacks Takes more than Incident Detection
Network Security, Routers and Data Centres : 06 December, 2013
Mike Horn of NetCitadel examines new approach to cyber threat management connecting threat detection to appropriate and timely responses
Review of 2013 corporate security threats
Anti-virus and anti-malware software : 06 December, 2013
Kaspersky Lab looks back at 2013 and highlights the main cyber-crime security threats affecting corporate bodies
4 out of 5 Employees using unapproved apps
Data encryption : 05 December, 2013
Research from McAfee has highlighted the dangers of unapproved apps in the workplace with 80% of employees surveyed using SaaS applications without approval
Infrastructure upgrade enables 2048-bit SSL traffic inspection
Data encryption : 05 December, 2013
Ahead of strengthened industry mandate on encryption standards, Zscaler has completed migrating its cloud infrastructure for 2048-bit SSL traffic inspection
Data leakage ranked highest threat for police forces
Data Protection : 05 December, 2013
Research from Gemalto indicates UK police employees are more concerned about the threat of data loss than that or resource cuts
Integrated security protects IT infrastructure at UK zoo
Unified Threat Management : 05 December, 2013
Unified Threat Management system from WatchGuard Technologies is ensuring continued operation of the IT network infrastructure being used at Chester Zoo in the UK
Research highlights vulnerability of large e-commerce websites
Data encryption : 04 December, 2013
High-Tech Bridge has conducted research into e-commerce providers finding large numbers of vulnerabilities to phishing and identity theft
Data centre infrastructure protection at cloud services provider
Network Security, Routers and Data Centres : 04 December, 2013
SSH Communications is providing a European cloud provider with network visibility and compliance using CryptoAuditor
Huge US increase in mobile payment acceptance software
Mobile computing security : 04 December, 2013
Apriva details the level of uptake in the USA of secure payment acceptance software for mobile endpoints
Advice on preventing theft of corporate login credentials
Data Protection : 04 December, 2013
Trusteer provides details on how corporate credentials are stolen and what methods should be used to prevent such theft
Premium video content protection for Sky Italia
Software Rights Management : 03 December, 2013
The Sky Go OTT Video service is protecting premium content from piracy using the digital rights management software DRM Fusion from Inside Secure
Cryptographic technology combats surveillance threat
Data encryption : 03 December, 2013
Cryptovision fights back against international and domestic surveillance with the release of crypto solutions with no hidden backdoors
Two-thirds of UK online shoppers use mobile devices
Mobile computing security : 03 December, 2013
Tripwire survey shows mobile shopping trends in the UK ahead of the busy Christmas retail season
Free file sanitization from the cloud
Anti-virus and anti-malware software : 03 December, 2013
Free cloud based sanitization service from Votiro enables users to upload suspicious files to the cloud for analysis
Online shoppers more vulnerable than ever this Christmas
Payment cards and e-commerce security : 02 December, 2013
WatchGuard Technologies outlines the five most common online threats to watch out for with the start of the holiday season online shopping spree
Fake order confirmations and delivery notices
Anti-virus and anti-malware software : 02 December, 2013
The holiday season is expected to be accompanied once more by fake delivery and shipment notices as well as order confirmations containing links to malware, warns Dell Secureworks
Cloud-based two factor tokenless authentication
Authentication : 02 December, 2013
A new service has been launched enabling two-factor authentication for identity management across a variety of communication channels
Two factor authentication for online identity management
Authentication : 02 December, 2013
SecurEnvoy explains how to reduce the risk of unauthorized data access using a variety of two-factor authentication that doesn't rely on seed records being held by the authentication company
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012