Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
IT Security
Context based protection for modern cyber threats
Anti-virus and anti-malware software : 29 November, 2013
ZScaler explains the need for greater context in threat protection in today's environment where signature based protection tools are no longer adequate
 
Busy season fraud prevention tips for retailers
Anti Fraud software : 29 November, 2013
Cybersource is offering advice to the retail trade on how to prepare themselves for dealing with fraud as the busy shopping season approaches
 
Is there such a thing as a silver bullet for web application security?
Internet Security and Content Filtering : 29 November, 2013
Jerome Clauzade of Bee Ware examines web application security and an effective structure for implementing it using a combined resource approach
 
Recent cyber crime successes will fuel threats for next year
Mobile computing security : 28 November, 2013
AppRiver is predicting an increase in malware attacks in 2014 as successful campaigns in 2013 gain hold
 
Top IT security trends and predictions for 2014
Data encryption : 28 November, 2013
Bloxx takes a look at 2014 and predicts that the dark web will start to rise to the surface as more focus is placed on revealing its secrets
 
Self replicating banking trojan set to rise in prominence
Finance and Banking Security : 28 November, 2013
Kaspersky Lab is warning of an expected increase in online banking fraud with the prominence of the Neverquest Trojan
 
Avoiding the dangers of online shopping
Payment cards and e-commerce security : 28 November, 2013
With large increases predicted this season in the use of online shopping, Rapid7 is providing consumers with advice on how to avoid becoming the victim of fraud
 
CPA certification for mobile call cryptography
Data encryption : 27 November, 2013
The Cryptify Call smartphone application for call encryption has received Commercial Product Assurance certification
 
IT threat predictions for 2014
Network Security, Routers and Data Centres : 27 November, 2013
Fortinet is predicting Android malware on Industrial Control Systems as one of the key threats to watch out for in 2014
 
Collaboration required on reducing intellectual property theft
Data Protection : 27 November, 2013
Thales comments on the US view on intellectual property theft and the need for greater collaboration on cyber issues
 
Managed sercurity service for Norway
Cloud Computing Security : 27 November, 2013
Norwegian Broadnet is using cloud-based DDoS managed security from Arbor Networks to protect its customers
 
Global agreement signed on mobile payments
Finance and Banking Security : 26 November, 2013
HP and Accumulate have signed an agreement to expand penetration into the market of secure mobile payments and banking
 
Presentation on security and the connected car
Mobile computing security : 26 November, 2013
Axway representative is attending the Auto Apps and Mobile Devices Evolution 2013 conference to express views on security and the connected car
 
Cloud based security for managed services
Cloud Computing Security : 26 November, 2013
Partnership between Zscaler and Easynet Global Services brings direc-to-cloud security to managed cloud infrastructure provider
 
October spam gears up to forthcoming holiday season
Anti-virus and anti-malware software : 26 November, 2013
Report from Kaspersky Lab examines the spam trends in October with Syria and holiday themes being at the forefront of spam campaigns
 
Protection against internet fraud and fake websites
Internet Security and Content Filtering : 26 November, 2013
Web Inspector from Comodo includes advanced malware detection for the identification of web pages containing malicious code
 
Improvements required in healthcare security management
Software Asset Management and Compliance : 25 November, 2013
Survey results demonstrate requirements for improved risk assessment in the healthcare industry to increase IT security protection
 
Security to go through evolutionary step in 2014
Data Protection : 25 November, 2013
Tim Keanini of Lancope provides his predictions for the IT security environment that he expects to emerge during 2014
 
DDoS mitigation effectiveness survey results
Anti-virus and anti-malware software : 22 November, 2013
Prolexic defines what really matters to e-commerce companies in the protection against Distributed Denial of Service attacks
 
Analysis of privileged identity risks and threats
Data Protection : 22 November, 2013
Integration between products from Securonix and Lieberman Software enables monitoring and analysis of privileged user activities
 
Increased visibility and control for cloud and mobile environments
Cloud Computing Security : 22 November, 2013
UserInsight from Rapid7 enables security professionals to have greater visibility and control of cloud and mobile network user behaviour
 
Successful java exploit protection record
Anti-virus and anti-malware software : 22 November, 2013
Automatic exploit prevention methods used by Kaspersky Lab has succeeded in blocking millions of java based attacks to September 2013
 
Real time network visibility for wafer test service company
Network Security, Routers and Data Centres : 21 November, 2013
Taiwan company takes CounterACT for improved network endpoint visibility and policy enforcement across its multi-site operation
 
Security assessment tool to be used in International Telecommunication Union
Internet Security and Content Filtering : 21 November, 2013
UN agency to deploy Immuniweb as part of its website security initiatives for the protection of government websites
 
UK banks a target for sophisticated Shylock malware
Finance and Banking Security : 21 November, 2013
BAE Systems Detica explains the threat posed by the Shylock malware and its effects on the UK banking and finance industry
 
Unified identity management for shared accounts
Authentication : 20 November, 2013
The Centrify for SaaS is available for the protection of shared social media accounts used by enterprises
 
Real time threat management for APTs and malware
Network Security, Routers and Data Centres : 20 November, 2013
Reduced incident response times achievable with security threat management platform to counteract advanced persistent threats
 
UK workers can't resist clicking on web links
Anti-virus and anti-malware software : 20 November, 2013
Sourcefire study in the UK finds that only 10% of the workforce never click on web links that they receive via e-mail
 
Threat analytics for privileged access
Data Protection : 19 November, 2013
CyberArk has launched a product for privileged threat analytics to prevent advanced, external and insider cyber attacks
 
Dell SecureWorks joins cyber incident response scheme
Data Protection : 19 November, 2013
The UK Government's cyber incident response scheme will benefit from the expertise of the Counter Threat Unit at Dell SecureWorks
 
Cloud information protection available on AppExchange
Cloud Computing Security : 19 November, 2013
CipherCloud is attending Dreamforce 2013 with its cloud information protection platform available for saleforce.com users through AppExchange
 
Are mobile devices safer than computers for online shopping?
Payment cards and e-commerce security : 18 November, 2013
Lancope provides three reasons why it believes that it is safer to shop online using a mobile device than a personal computer with a standard browser
 
IT security approaches for small businesses
Network Security, Routers and Data Centres : 18 November, 2013
Klaus Gheri of Barracuda Networks explains the dilemma faced by small businesses in securing their networks and how to approach solving the problem
 
Report examines extent of concern about cyber-bullying
Internet Security and Content Filtering : 18 November, 2013
Online bullying is the subject of a McAfee report released today which reveals that only a tenth of parents believe their children are safe from bullying when using the internet
 
Strategic partnership enables mobile point of sales
Data encryption : 15 November, 2013
Strategic relationship between Thales and Spire Payments brings mobile payment point of sale capabilities to retailers
 
Data destruction predicted to rise in 2014
Data Protection : 15 November, 2013
Websense has made a set of predictions for the cybersecurity landscape in 2014 with attacks becoming more targetted and data destruction on the increase
 
Multi-layered security pitfalls in blocking DoS attacks
Anti-virus and anti-malware software : 15 November, 2013
Prolexic releases a white paper explaining the pitfalls to businesses of deploying multi-layered network security as a means of blocking DoS attacks
 
Protection service for securing IT servers
Data Protection : 14 November, 2013
Physical, virtual and cloud-based servers can now be secured using the server protection services available from Dell Secureworks
 
Security policy challenges met through orchestration suite
Network Security, Routers and Data Centres : 14 November, 2013
Tufin has taken security policy management a step further through policy orchestration to meet the needs of latest generation networks
 
Identity federation for customer portal access
Data Protection : 14 November, 2013
Splunk chooses Ping Identity for single-sign-on and identity federation for its customer portal
 
Shared development and logistics fuelling cyber arms race
Data Protection : 13 November, 2013
A supply chain analysis report from FireEye reveals the common development and logistics structure used in delivering malware
 
BYOD security for the healthcare sector
Network Security, Routers and Data Centres : 13 November, 2013
ForeScout reveals how the healthcare industry is using CounterACT in network security to manage secure services is changing IT environments that increasingly encompass user endpoints
 
API Gateway extends to Amazon Web Services
Software Asset Management and Compliance : 13 November, 2013
Scalable API management extends data flow governance beyond the enterprise for B2B and cloud infrastructure integration
 
Turkish content deliver network partnership
Internet Security and Content Filtering : 12 November, 2013
Akamai helps Turk Telekom to deliver a secure, high performance content delivery network to Turkish internet users
 
Survey shows greater need for network management automation
Network Security, Routers and Data Centres : 12 November, 2013
Increasing network complexity with IPv6, cloud computing and virtualization is driving greater needs amongst IT professionals for more automation of network management
 
Advanced bulletin on MS patch Tuesday
Anti-virus and anti-malware software : 11 November, 2013
Rapid7 comments on patch update from Microsoft due this Tuesday with few complications for IT administrators
 
Enhanced virtualization support for next generation firewall
Network Security, Routers and Data Centres : 11 November, 2013
The latest version of Stonesoft's next generation firewall includes support for virtualisation and API for security management center
 
Online retail security best practice
Data encryption : 11 November, 2013
Dave Anderson of Voltage Security explains best practices for online retailers to ensure high levels of security
 
Phishing e-mails treble during last quarter
Anti-virus and anti-malware software : 11 November, 2013
Kaspersky Lab report reveals the increased levels of malicious spam and phishing attempts during last three months despite overall reduction in spam levels
 
Protecting identity when working remotely
Authentication : 08 November, 2013
SecurEnvoy's Steve Watts explains the variants of two-factor authentication and how companies can prevent their data from being accessed
 
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com