Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Data Protection
Threat Horizon Report Examines Security To 2012
Data Protection : 04 October, 2010
The IT security landscape for 2012 comes under the spotlight in a new Threat Horizon report issued by the Information Security Forum
Removing Expertise From Online Access Improves Security
Data Protection : 01 October, 2010
GrIDsure founder comments on the need for simplified highly secure access control to prevent breaches due to lack of expertise in the user community
Network Based Protection Insufficient to Thwart Stuxnet
Data Protection : 01 October, 2010
Veracode comments on the severity of Advanced Persistent Threats like the Stuxnet worm and advises an alternative approach to critical infrastructure security involving the use of code verification techniques to ensure back doors are tightly closed
Estate Agent Data Theft Highlights Dangers Of Insider Threat
Data Protection : 01 October, 2010
Overtis explains how privileged access management can assist in the prevention of high value data loss through theft by trusted employees
French Mobile Phone Hack Due To Insider Fraud
Data Protection : 30 September, 2010
Consequences of failing to protect critical data from being abused by insiders illustrated in mobile phone hack discovered in France involving illegal online sales of SIM card unlock codes
Fortify Comments On German ID Card Hack
Data Protection : 30 September, 2010
German national ID card exposure consistent with failure to design and integrate security into the system from the beginning, according to Fortify Software
Security Budget Spending In Constrained Times
Data Protection : 29 September, 2010
Bob Heard of Credant Technologies analyses how IT security can maintained whilst working within constrained budgets and without compromising data integrity
Data Storage Management Challenges
Data Protection : 28 September, 2010
Imperva examines data storage requirements to enable correct levels of access without unnecessary duplication and without compromising security requirements
High Visibility Enterprise Threat and Risk Management
Data Protection : 21 September, 2010
The new release of ETRM platform from ArcSight brings improved visibility of risk and threat management across the enterprise
Security System Testing and Optimisation Tool
Data Protection : 21 September, 2010
Traffic IQ V2.0 from Idappcom provides the necessary tools to harden defences against hacking and optimise security appliances within the organisation.
Advice For companiestest Supporting National Work From Home Day
Data Protection : 21 September, 2010
Shred-IT is providing some tips for companies on how to avoid data breaches whilst employees work from home during the national work from home day taking place in the UK this week
Single Sign-On Integrated With PalmSecure For Biometric Authentication
Data Protection : 20 September, 2010
Passlogix and Fujitsu have integrated the PalmSecure vascular biometric recognition technology with v-GO Single Sign-On to add biometrics to two-factor access control and user authentication
Web Application Firewalls Rank Highly In Data Protection Tables
Data Protection : 16 September, 2010
Survey by Imperva and Securosis finds that a mixture of traditional approaches and modern data security technology provides the right environment for preventing data breaches
Preventing Data Leakage Through Reducing Employee Mistakes
Data Protection : 16 September, 2010
Nick Lowe of Check Point discusses the loss of data through employee error and suggests ways of applying preventive measures to reduce these instances of non-malicious data loss incidents
Core Insight Enterprise Released to Beta Customers
Data Protection : 15 September, 2010
Large global enterprises sign up for beta testing on the latest security testing and measurement appliance from Core Security Technologies, bringing prioritised testing regime to business critical applications
Full-Disk Encryption From WinMagic Supports Intel Anti-Theft Technology
Data Protection : 15 September, 2010
New Intel processors with encryption and anti-theft technology now supported by the SecureDoc Full Disk Encryption product available from WinMagic
Avoiding the hidden costs of the mobile workforce
Data Protection : 14 September, 2010
Colin Woodland of IronKey examines data safety and the costs associated with data breaches as the risks become higher with increasing levels of workforce mobility
Football Fan Passport Data Sale Scandal
Data Protection : 13 September, 2010
Football's governing body is under investigation from the ICO due to allegations of the sale of passport data from football fans to ticket sales agents
Wireless Hacking Study Shows Vulnerability Of Vehicle Software Systems
Data Protection : 07 September, 2010
Fortify urges car makers to build security into the ever-increasing amounts of code used in on-board vehicle computers preventing potential drive-by attacks of vehicle locking and ignition systems providing easy access for car thieves
Encrypted Flash Drives For Linux and Mac
Data Protection : 06 September, 2010
The Kanguru Defender Elite encrypted thumb drive with AES 256 hardware encryption is now available for use on Mac and Linux platforms
Dell Bundles Privileged Identity Management On PowerEdge Server Models
Data Protection : 03 September, 2010
Cyber-Ark has reached an OEM agreement with Dell for equipping the company's PowerEdge rack mounted servers with the Cyber-Ark privileged identity management suite
Privacy Breach Detection Software Fro Texas Hospital
Data Protection : 03 September, 2010
FairWarning is supplying a large not-for-profit hospital in Texas with software to enable the institution to become compliant with patient data privacy standards
ISACA Milestone In Risk Certification
Data Protection : 02 September, 2010
The 1000th certificate in Risk and Information Systems Control has been issued by ISACA
Online Travel Company Takes Security Blanket From TCS
Data Protection : 27 August, 2010
The ezRez online travel software company takes automatic lockdown tool for PCI DSS compliance from Trusted Computer Solutions
Inside The Mind Of A Hacker
Data Protection : 27 August, 2010
Pete Wood of the ISACA Security Advisory Group provides some background detail on how hackers operate and what is necessary to gain protection from their criminal activities
Blue Cube Partners With Secure Flash Drive Supplier
Data Protection : 27 August, 2010
Kanguru Solutions joins Blue Cube in partnership to extend the company's encrypted USB flash drive suite of products
Hospital Breaches Data Security Regulations With Unencrypted Data Loss
Data Protection : 26 August, 2010
Cyber-Ark comments on the unacceptability of transferring data using unencrypted removable media when secure data transfer technology is so readily and widely available
Policy Enforcement Crucial In Avoiding Expensive Data Loss Incidents
Data Protection : 26 August, 2010
Overtis uses the recent FSA penalty of over 2 million pounds on Zurich Insurance to illustrate the benefits of user activity management and policy enforcement technology to prevent such costly incidents of sensitive data leakage
CESG Kite Mark Awarded To SafeStick
Data Protection : 26 August, 2010
Secure USB drive from BlockMaster successfully undergoes UK government testing program resulting in CESG Claims Test Mark certifying security functionality
Privacy Protection For US Small Health Care Providers
Data Protection : 26 August, 2010
Privacy auditing and data breach detection software from FairWarning is now available at reduced cost to small and medium sized health care providers in the USA
High Profile PayPal Hack Illustrates Password Security Flaw
Data Protection : 25 August, 2010
As another password based hack strikes online service users, GrIDsure discusses using one-time pass codes based on simple pattern recognition technology as an alternative to easily stolen PIN codes and passwords
Imperva Survey Demonstrates Extent Of Insider Threat
Data Protection : 25 August, 2010
Stealing company data when leaving an organisation is a significant threat for industry originating from employees with almost a quarter of those surveyed willing to walk out with sensitive information
Cloud Hacking Potential Revealed at DEF CON 2010
Data Protection : 25 August, 2010
Las Vegas hacker conference unveils extent of cloud computing hacking activity with hackers seeing the development of cloud computing as being a golden opportunity for them, according to survey results
Sophos Comments On Zurich Insurance Data Loss Fine
Data Protection : 25 August, 2010
The UK's FSA has levied a heavy fine on Zurich Insurance for sensitive data loss acting as a timely reminder to UK businesses of the potential costs of allowing sensitive information to be leaked
Data Security Improvement With Shared Accounts Management
Data Protection : 20 August, 2010
Passlogix has upgraded v-GO Shared Accounts Manager for providing improved security and compliance through individual user identifications on shared accounts
Single Sign-On For WebEx Meeting Centre
Data Protection : 19 August, 2010
PingFederate SaaS Connector enables improved security for Cisco's WebEx Meeting Centre through single sign-on capabilities
Ease Of Password Cracking Drives Demand For Two Factor Authentication
Data Protection : 18 August, 2010
Gemalto explains why 2FA technology should be adopted for enhanced network security and explains the paradox of password protection with simple passwords being easy to crack and complex ones being difficult to remember
Financial Services Group Takes E-mail Encryption from Webroot
Data Protection : 17 August, 2010
The Jelf Group in the UK enhances its e-mail security and improves regulatory compliance with the use of Webroot's e-mail encryption service
Oracle Database 1.1g Available With Identity Management System
Data Protection : 17 August, 2010
Lieberman Software becomes an Oracle partner and makes it's Identity Management System available complete with Oracle database
Tax Phishing Fraud Uses Social Engineering As Its Basis
Data Protection : 16 August, 2010
Cyber criminals increase levels of social engineering sophistication to gain sensitive information, often luring victims unknowingly into a scam
Longer And More Complex Passwords Are Not The Answer To Access Security
Data Protection : 16 August, 2010
Stephen Howes of GrIDsure comments on the recent call for longer and more complex passwords by the Georgia Tech Research Institute, saying that such solutions introduce more complexity for the user who will easily forget such passwords
Identity Theft Awareness Week Commences
Data Protection : 13 August, 2010
LifeLock is involved in Identity Theft Awareness Week with an identity theft summit scheduled to take place for law enforcement bodies during the week
Enhanced Security Against Insider Threats
Data Protection : 13 August, 2010
Series A Version 7 from AEP Networks provides access level management and user quarantining in an effort to prevent employee data leakage problems
64GB USB Drive With Up To Three Factor Authentication
Data Protection : 12 August, 2010
Secure high capacity USB memory stick for high security applications now available in 64Gb Version from MXI Security
Failed Electronic Payroll Heist Demonstrates Value Of Information Credentials
Data Protection : 12 August, 2010
Imperva uses the recent hacking incident at Regeneron to illustrate the potential value of captured information to cyber criminals
ContactPoint Database Abolished
Data Protection : 12 August, 2010
Child protection database replacement system must be equipped with user activity management to protect data from unauthorised access according to Overtis
Wipe Technology Secures Data On Photocopier Systems
Data Protection : 11 August, 2010
The Toshiba Self-Encrypting Drive now offers additional security for photocopiers and printers using wipe technology which can be used to securely erase data from hard disks thereby preventing data leakage from vulnerable office equipment
On-Line Training System For ArcSight Users
Data Protection : 11 August, 2010
End users of ArcSight technology can now benefit from the ArcSight University which provides role-based training for developing skills in enterprise threat and risk management
LifeLock Comments On Inadvisable Usage Of Student Social Security Numbers
Data Protection : 11 August, 2010
Educational establishments in the USA are preaching student personal information by indiscriminately using social security numbers for local identification tasks
India and New Zealand Distributor Appointed For ERPM
Data Protection : 11 August, 2010
Aquion to supply Lieberman Software's Enterprise Random Password Manager privileged access management software in New Zealand and India
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012