Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Data Protection
Renewed Product Set Steps Up To Combat Advanced Persistent Threats
Data Protection : 05 May, 2011
Endpoint and Protection Center from Symantec revised as the IT protection company responds to increased sophistication of both traditional and virtual cyber-attacks with advanced persistent threats
Secure Collaboration Reaches Tech.Ed 2011 Awards
Data Protection : 05 May, 2011
The Microsoft Tech.Ed North America Conference later this month will feature Accellion's Secure Collaboration which has reached the finals of the event
Political Hacktivism Alert Raised After Australian University Attack
Data Protection : 04 May, 2011
The use of hacking with political motivations as demonstrated recently at the Monash University in Australia, raises the level of server attacks along with the risk of cyber-criminals using techniques developed by political hackers
Insider Threat Remains High With External Cyber Threats To Grow In Next Five Years
Data Protection : 19 April, 2011
Cyber-Ark study examines the persistent problem of insider threats through privileged access and looks more deeply into IT department snooping habits
Data Management Issues Highlighted In LogLogic Survey
Data Protection : 19 April, 2011
Security and compliance of IT data carry more weight than productivity benefits for survey respondants to LogLogic's study on IT data management
IT Security Approach Minimises Hack Impact At WordPress
Data Protection : 18 April, 2011
Encrypted password files at WordPress saves commercially sensitive data from loss during successful hack of the company's source code
Unencrypted Data Tape Leads To Large Scale Data Loss
Data Protection : 18 April, 2011
The recent Irish insurance company loss of customer data from a data tape illustrates the necessity for encrypted storage and the ease with which such losses can be prevented
The Impact Of Social Engineering Techniques On Malware Distribution
Data Protection : 14 April, 2011
Trusteer discusses how social engineering methods used by hackers can leave companies vulnerable to attacks regardless of time spent educating employees on being aware of the techniques used
Guidance On Securing Sensitive Customer Data
Data Protection : 11 April, 2011
Protegrity uses the Epsilon data breach as an example for providing guidance on the use of best practices combined with tokenisation to prevent customer data leakage
Ripple Effect From Epsilon Breach Hits The UK
Data Protection : 11 April, 2011
With e-mail marketing company having significant numbers of clients in the UK, the effect of the Epsilon data breach is starting to be felt in the country with spear-phishing attacks
Desktop Data Loss Prevention From Titus
Data Protection : 07 April, 2011
Fitting into corporate data loss strategies, the Data Loss Prevention application from Titus can be used in desktop applications throughout the organisation
How State Sponsored Advanced Persistent Threats Are On The Rise
Data Protection : 05 April, 2011
Amichai Shulman of Imperva takes an in-depth look at the migration of cyber-threats towards Advanced Persistent Threats and what this means to global risks
Exclusive Social Networking Site Uses Strong Digital Identification Technology
Data Protection : 05 April, 2011
WISeKey is providing peace of mind to users of a new VIP social networking site by using digital identification to build a trusted community
Insider Trading Case Emerges From Privileged Access Abuse
Data Protection : 04 April, 2011
Imperva comments on the data access rights implications of the insider trading case involving US Chemist
Real Time Activity Logging At New York Agency
Data Protection : 04 April, 2011
HHS-Connect is using Novell Sentinel for IT Security and event monitoring over large-scale network involving 80,000 constituents
Encryption Solutions For High Speed Networks
Data Protection : 01 April, 2011
The Metro Ethernet family of encryption products from InfoGuard support networks of up to 10 gigabits per second for high speed data protection
Hackers Gain Access To TripAdvisor Database
Data Protection : 28 March, 2011
LogRhythm comments on the recent announcement by TripAdvisor that unauthorised access had been gained to the company's membership database Hack Reassurance Insufficient
Data Protection : 23 March, 2011
Stonesoft comments on the hack which compromised customer data saying that the low level of information is not an excuse for lax security practices Customer Details Go Missing After Successful Hack
Data Protection : 23 March, 2011
Hackers have got away with names and e-mail addresses from the database of customers of online retailer
Poor Control Of Third Parties Leads To Data Leakage
Data Protection : 23 March, 2011
LogRhythm comments on the data loss and the need for tight control over third party access to critical and sensitive data in order to prevent data loss
Poor Investment Leaves Companies Short On Data Leakage Prevention
Data Protection : 21 March, 2011
Dimension Data comments on poor industry investment levels in Data Loss Prevention and provides advice on the need for securing data against potential leakage
Swiss Bank Takes Data Loss Prevention Solution From Check Point
Data Protection : 17 March, 2011
DLP Solution From Check Point provides Bank Leumi with protection from data loss incidents as the bank improves safeguards of customer data
The Demise of Token Based Two-Factor Authentication
Data Protection : 16 March, 2011
Andrew Kemshall of SecurEnvoy explains why tokens are a thing of the past and that the way forward is for tokenless two-factor authentication using SMS
Partnership Integrates Web Application Scanning With Security Testing
Data Protection : 15 March, 2011
NTO partners with Core Security Technologies to integrate NTOSpider vulnerability scanner with all the security testing offerings availabe from Core
Part 2 Of Generation G-Mail Report Examines Hidden Risk Of Restrictive E-mail Policies
Data Protection : 10 March, 2011
Mimecast continues to examine the protection of corporate data from inadvertent leakage through the provision of e-mail policy flexibility to cater for the latest generation of corporate e-mail users
Enhanced Insider Threat Protection With SecureSphere 8.5
Data Protection : 09 March, 2011
Imperva releases SecureSphere 8.5 with agent-based monitoring and auditing to bring additional protection to organisations from the insider threat
Report Outlines Criticality of Metadata Framework For Data Security
Data Protection : 08 March, 2011
The use of metadata framework technology is the subject of a report which examines data security strategies during explosive growth in unstructured data storage
Scalable Cryptography Management Platform
Data Protection : 08 March, 2011
Cryptosoft has released an encryption service platform that can be scalably deployed across a variety of environments including cloud, virtual or on-premises configurations
Securing Personal Laptops For Business Use
Data Protection : 07 March, 2011
With the increasing trend of companies providing a stipend to employees to buy their own laptops for both business and personal use, Nick Lowe of Check Point examines the security implications of this cost-saving measure
IPS Producer Takes Core Impact Pro For Penetration Testing
Data Protection : 07 March, 2011
Core Security Technologies has supplied security software supplier Top Layer Security with Core Impact Pro for validation of security measures and penetration testing of the company's Intrusion Prevention System
Cloud Based Management Of Endpoint Devices
Data Protection : 07 March, 2011
DESlock+ Enterprise Server has been released by Data Encryption Systems enabling cloud computing based policy encryption management of endpoints
Special Offer On Upgrade To DeviceLock 7
Data Protection : 03 March, 2011
DeviceLock is encouraging customers to upgrade to version 7 of the Endpoint DLP suite from the company with special incentives being offered
CeBIT Visitors Warned Of Risks Concerning Viruses On Flash Drives
Data Protection : 03 March, 2011
Companies are risking computer infection and data loss by allowing unknown USB drives to be plugged into their computers, warns BlockMaster
Alarming Increase In USB Sticks Being Left At UK Dry Cleaners
Data Protection : 02 March, 2011
A study in the UK has shown that as many as 17,000 removable USB memory devices are left in clothes pockets each year in the UK and being sent to the cleaners
Commercial E-mail Put At Risk By Generation Gmail
Data Protection : 24 February, 2011
Mimecast reveals the trend in office environments towards using web based e-mail providers for business correspondance potentially compromising corporate data assets
Arxan Enters Market For Biometric System Security
Data Protection : 24 February, 2011
Through partnership with iris recognition supplier, Arxan provides additional layer of security through its software for the biometric market
Conseal Remote Authentication To Be Delivered Through iomart
Data Protection : 24 February, 2011
Secure authentication cloud services offered by Conseal Security will be delivered by iomart Hosting under new agreement between the two companies
Mobile Employees Gain Single Sign-On and Strong Authentication
Data Protection : 23 February, 2011
Imprivata has introduced OneSign Anywhere to enable companies to provide remote access to mobile workers with strong authentication from mobile devices without software overhead
Endpoint DLP With Contextual COntrols
Data Protection : 23 February, 2011
DeviceLock 7.0 Endpoint DLP Suite provides enhanced Data Loss Prevention including contextual protocol control
Two Factor Authentication For Children's Hospital
Data Protection : 23 February, 2011
Gemalto is providing Protiva to Seattle Children's hospital for strong authentication to gain access to patient records
IT Governance Advises Wiser Spending Of Constrained IT Budgets
Data Protection : 21 February, 2011
WIth IT budgets shrinking and protection requirements becoming stronger, IT Governance is providing advice to companies on wise spending policies to get the most benefit from available funds
Centralised Control Of USB Devices Containing Sensitive Data
Data Protection : 21 February, 2011
The Conseal USB provides increased control over USB devices containing confidential information including cloud-based management console and the ability to wipe sensitive content
Insider Threat Risk Reduction
Data Protection : 17 February, 2011
Sean Glynn of Credant Technologies offers some insight into the theft of commercial information from people inside the organisation and investigates methods that can be used to reduce the threat of insider data theft
Vendor Alliance Program For USB Device Remote Management
Data Protection : 17 February, 2011
SafeConsoleReady from BlockMaster provides USB device manufacturers with access to secure USB device management platform
Database Activity Monitors Brings Enhanced Security To Green Mountain
Data Protection : 17 February, 2011
Coffee Roasters Gain Granular Search Capability As Part Of Its Security Information and Event Management System from NitroSecurity
Hardware Security Modules Meet NIST Cryptography Requirements
Data Protection : 16 February, 2011
Best practice guidelines from the National Institute of Standards and Technology for cryptographic algorithms are fully met by hardware security modules from Thales
Partnership Results In Hardware Encrypted Secure USB Drive
Data Protection : 16 February, 2011
BlockMaster has unveiled a new product at the RSA Conference for encrypted secure data storage on USB resulting from the company's partnership with Kingston Digital
HDD Manufacturer Parterns With DES For Disk Protection
Data Protection : 16 February, 2011
DESlock+ licences will be supplied for system protection to purchasers of CnM Core external hard disk drives
Managed Tokenisation Service For Personally Identifiable Information
Data Protection : 16 February, 2011
Cloud based tokenisation as a service offering from nuBridges brings improved security and compliance for electronic health records and personally identifiable information
High Performance Enpoint Protection For Virtual Environments
Data Protection : 16 February, 2011
Symantec has re-released two versions of the company's Endpoint Protection product with faster performance and advanced protection for endpoints
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo