Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Data Protection
Privileged Identity Management Reduces Insider Threat In Casino and Gaming Industry
Data Protection : 20 January, 2011
Philip Lieberman of Lieberman Software takes a look at the specific IT security requirements of the gaming industry and explains how automated priviliged access and identity management can reduce the risk factors in casinos relating to insider threats
Quest Software Acquires Data Protection Vendor
Data Protection : 20 January, 2011
BakBone Software has been bought out by Quest Software, strengthening the company's position in the market for data protection solutions
Online Management Service For Strong Authentication Tokens
Data Protection : 20 January, 2011
A self care portal has been launched by OpenTrust to enable the quick and easy online management of such digital credentials as smart cards and tokens used for strong authentication
HSM Based Cryptography For SQL Server
Data Protection : 19 January, 2011
Thales nShield hardware security modules are being deployed by Microsoft SQL Server customers for key-management and cryptography
Access Enterprise Portable Security Device Management
Data Protection : 14 January, 2011
Control of secure USB devices and digital identity applications in the enterprise is catered for with the latest release of Access Enterprise Server from MXI Security
Mainframe Database Activity Monitoring Partnership
Data Protection : 13 January, 2011
Application Security has joined Neon Enterprise Software in alliance to deliver mainframe database activity monitoring to combat insider threat vulnerabilities in large enterprise environments
Secure Supply Chain Document Exchange System For Cycling Union
Data Protection : 13 January, 2011
OpenTrust MFT is being used by the International Cycling Union for secure exchange of confidential documents with manufacturers
Unified Endpoint Management From McAfee
Data Protection : 13 January, 2011
Enterprise Mobility Management from McAfee brings integrated endpoint security and management using the ePolicy Orchestrator infrastructure
Healthcare Survey Reveals High Confidence Levels in FairWarning
Data Protection : 13 January, 2011
Survey of users of single sign-on and identity management products in the healthcare industry indicates confidence in compliance to HIPAA regulations using FairWarning
Password Control Highlighted In Australian Vodafone Privacy Alert
Data Protection : 12 January, 2011
Lieberman Software comments on the Privacy Commissioner’s involvement in Vodafone Australia after significant data breach in the country
ICT Recovery in The UK Supported By Trustmarque
Data Protection : 12 January, 2011
Public sector technology funding campaign in the UK is being supported by Trustmarque Solutions enabling public sector companies to find effective solutions during government budget cuts
Penetration Testing For Application Developers
Data Protection : 11 January, 2011
Pentura's new secure application development service provides penetration testing expertise to software developers and consultancies
Full Disk Encryption For Windows, Mac and Linux
Data Protection : 10 January, 2011
SecureDoc v5 is now available from WinMagic bringing seamless data protection through full disk encryption for a range of popular desktop operating systems
US Government Hunts Down Disgruntled Employee Threats
Data Protection : 10 January, 2011
Imperva comments on reports of increased US government activity on combating insider threats in the wake of the recent Wikileaks scandal
Prime Changes Predicted For IT Security in 2011
Data Protection : 10 January, 2011
John Colley of (ISC)2 is making predictions for how the information security landscape will change in fundamental ways during 2011
Yorkshire Post Public Snooping Revelations Come As No Surprise
Data Protection : 07 January, 2011
Cyber-Ark comments on the revelation of trusted public sector workers using their privileges to snoop through private records and believes that this is no rare phenomenon
ASUS Selects Solid State Memory From SanDisk
Data Protection : 07 January, 2011
Secure solid state drives from SanDisk to be incorporated into the new Eee Slate Tablet available from ASUS
USB Drives From SanDisk Now Feature Encryption and Online Backup
Data Protection : 07 January, 2011
SanDisk is providing additional security for mobile workers to reduce data loss on the move with the introduction of SecureAccess software for encryption and online backup on the company’s range of retail USB drives
Lost Mobile Devices Remain Unclaimed At BritainÃÂÃâ€ÂÃâ€Âs Airports
Data Protection : 21 December, 2010
With increased levels of travel approaching over the Christmas break, Credant Technologies is issuing a warning concerning the annual epidemic of leaving laptops and mobile phones behind at airports and railway stations
Survey Reveals Attitudes To Corporate Data Loss
Data Protection : 20 December, 2010
The significance of losing corporate data is still not fully understood in the user community according to the results of a survey conducted by BlockMaster
MOD Strengthens Defence Against Hackers
Data Protection : 17 December, 2010
UK Minister announces improved defences for the Ministry Of Defence to protect against a range of cyber-threats including leaks and hacking
Password Vulnerability Highlighted In Social Networking Hack
Data Protection : 14 December, 2010
GrIDsure comments on the Gawker Media and Twitter hack explaining how passcode generation can protect against such vulnerabilities
Symantec Examines Challenges Which Lie Ahead In 2011
Data Protection : 13 December, 2010
Cloud computing will be high on the list of challenges for IT security professionals in 2011 along with social media and mobile security, according to report from Symantec
Biometrics Still Being Left Behind for Logical Access Control
Data Protection : 10 December, 2010
Siemens reports on the low uptake of biometric technology despite the ever increasing needs for secure access to sensitive data
Passmark Ranks Endpoint Protection Software Highly
Data Protection : 09 December, 2010
Symantec's Endpoint Protection Small Business Edition has been recognised in performance tests by PassMark
Insider Threat Protection Takes On New Level In Light Of Wikileaks
Data Protection : 09 December, 2010
The UK Government has ramped up protection levels in the fight against insider threats as Wikileaks ruffles feathers in the corridors of power
Legal Expert Joins Imperva Board
Data Protection : 08 December, 2010
Imperva has recruited a new Chief Financial Officer to head the company's financial, legal, IT, facilities management and Human Resources functions
Data Breach Survey Identifies Snooping As A Growing Risk
Data Protection : 08 December, 2010
Workers regularly put themselves at risk from ÃâÅ"visual data breaches" also known as shoulder-surfing where information displayed on their screens is easily readable by adjacent people, increasing risks of data leakage through snooping
Strong Authentication System For Use On Trading Floors
Data Protection : 08 December, 2010
Protiva One4all has been released by Gemalto for use as a strong authentication system for traders operating across multiple terminals on trading floors
CMI Enters Distribution Agreement With BitDefender
Data Protection : 08 December, 2010
BitDefender fill a hole in the UK reseller market by providing greater access to its products through local distributor, CMI
Wikileaks Indicates Level Of Insecure Sensitive Data
Data Protection : 07 December, 2010
Lumension comments on the spate of Wikileaks revelations and highlights the growing concerns over sensitive data security
Free White Paper Available On Benefits Of Virtualisation
Data Protection : 06 December, 2010
ISACA issues technical document that examines both the benefits and challenges associated with implementing a virtual environment and how to minimize risks during implementation
USB Device Usage Becoming More Difficult To Control
Data Protection : 02 December, 2010
Unencrypted USB memory device usage in business environment endemic with poor control in evidence for maintaining data security
Penetration Testing vs Ethical Hacking
Data Protection : 30 November, 2010
Anthony Haywood of Idappcom explains the flaws in the use of bounty seeking ethical hackers to test your applications rather than application testing at the design stage
Ignoring The Insider Threat Can Lead To Incidents Such as The Wikileak Saga
Data Protection : 30 November, 2010
Imperva explains the benefits of tackling the insider threat and actively managing access to data to prevent embarrassing public leaks
Considering Human Factors In Vulnerability Assessment
Data Protection : 26 November, 2010
Giri Sivanesen of Pentura discusses the exploitation of people in launching cyber attacks on businesses with advice on how to factor this consideration into overall vulnerability assessment
Expensive Data Leak Demonstrates Need For PIM
Data Protection : 16 November, 2010
Banker loses General Motor flotation underwriting contract through failure to protect data from leakage as details of the transaction gets e-mailed to unauthorised users
Online Shopping From The Workplace Advice From ISACA
Data Protection : 10 November, 2010
Rapidly approaching holiday season brings online shopping perils to both employees and employers as the workplace is being increasingly being used as the base for shopping online
Password Disclosure Levels Remain High For Web Users
Data Protection : 10 November, 2010
Study from BitDefender shows that as many as 12% of web users disclose their passwords inappropriately
Employee Fraud Still Low On List Of Industry Priorities
Data Protection : 10 November, 2010
Shred-It contributes to International Fraud Awareness Week with advice to businesses on protecting themselves from increasing incidences of fraud committed by employees
PKI Based Bridge For Defence Industry
Data Protection : 09 November, 2010
CertifyID Armored from WISeKey provides strong encrypted mobile communications in compliance with defence industry requirements
Financial Services Operator Takes DbProtect From Application Security
Data Protection : 08 November, 2010
Think Money is protecting its database assets and ensuring compliance through the protection of sensitive data with the use of the DbProtect database protection solution from Application Security
Bank Clients Demand High IT Security
Data Protection : 08 November, 2010
Imperva comments on the growing trend for banking customers to change banks if they don't feel security is being taken seriously enough
Synovus Bank tighten security and access controls through Novell Identity Manager
Data Protection : 07 November, 2010
A multi-chartered financial services company with 30 different banks, Synovus Financial was looking to automate user provisioning and streamline access management. By using Novell Identity Manager and Novell Secure Login, Synovus has tightened security while vastly reducing IT costs.
Corporate Re-Branding At MXI Security
Data Protection : 05 November, 2010
With the launch of a new web site and rebranding the company's product set, MXI Software is seeking to strengthen its position in the market for secure USB products
PINsafe Buffers Users From SMS Based Zeus Vulnerabilities
Data Protection : 03 November, 2010
Fears of SMS based authentication being vulnerable have been declared by Swivel Secure as irrelevant to PINsafe which provides one time codes without transmission of PIN numbers either by SMS or on a website
Human Factors Prevail In Data Loss Incidents
Data Protection : 02 November, 2010
Alexei Lesnykh of DeviceLock puts recent data loss incidents and industry reports into perspective and suggests the human factor is predominant in the prevention of losses in an industry where IT has become consumerised and cyber-criminals are become more focused in their targets
Cyber Espionage Prevention Requires Control of the Weakest Link
Data Protection : 02 November, 2010
Giri Sivanesen, a senior security consultant at Pentura, explains how the human factor is the greatest threat to information security and how hackers and cyber criminals are increasingly employing an espionage-style approach to reaching their target information through human weaknesses
Middle East Distributor Appointed For Tokenless Authentication
Data Protection : 02 November, 2010
Optimus will now handle Swivel Secure distribution, bringing tokenless two-factor authentication technology using PINsafe to the Middle Eastern market
Demographic Trend Analysis For Personal Data Loss
Data Protection : 01 November, 2010
Garlick has analysed data loss and theft incidents in the UK and provide a breakdown of demographics with men being 60% more likely to suffer unauthorised personal data disclosure than women
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo