Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Data Protection
IT Security Approach Minimises Hack Impact At WordPress
Data Protection : 18 April, 2011
Encrypted password files at WordPress saves commercially sensitive data from loss during successful hack of the company's source code
 
Unencrypted Data Tape Leads To Large Scale Data Loss
Data Protection : 18 April, 2011
The recent Irish insurance company loss of customer data from a data tape illustrates the necessity for encrypted storage and the ease with which such losses can be prevented
 
The Impact Of Social Engineering Techniques On Malware Distribution
Data Protection : 14 April, 2011
Trusteer discusses how social engineering methods used by hackers can leave companies vulnerable to attacks regardless of time spent educating employees on being aware of the techniques used
 
Guidance On Securing Sensitive Customer Data
Data Protection : 11 April, 2011
Protegrity uses the Epsilon data breach as an example for providing guidance on the use of best practices combined with tokenisation to prevent customer data leakage
 
Ripple Effect From Epsilon Breach Hits The UK
Data Protection : 11 April, 2011
With e-mail marketing company having significant numbers of clients in the UK, the effect of the Epsilon data breach is starting to be felt in the country with spear-phishing attacks
 
Desktop Data Loss Prevention From Titus
Data Protection : 07 April, 2011
Fitting into corporate data loss strategies, the Data Loss Prevention application from Titus can be used in desktop applications throughout the organisation
 
How State Sponsored Advanced Persistent Threats Are On The Rise
Data Protection : 05 April, 2011
Amichai Shulman of Imperva takes an in-depth look at the migration of cyber-threats towards Advanced Persistent Threats and what this means to global risks
 
Exclusive Social Networking Site Uses Strong Digital Identification Technology
Data Protection : 05 April, 2011
WISeKey is providing peace of mind to users of a new VIP social networking site by using digital identification to build a trusted community
 
Insider Trading Case Emerges From Privileged Access Abuse
Data Protection : 04 April, 2011
Imperva comments on the data access rights implications of the insider trading case involving US Chemist
 
Real Time Activity Logging At New York Agency
Data Protection : 04 April, 2011
HHS-Connect is using Novell Sentinel for IT Security and event monitoring over large-scale network involving 80,000 constituents
 
Encryption Solutions For High Speed Networks
Data Protection : 01 April, 2011
The Metro Ethernet family of encryption products from InfoGuard support networks of up to 10 gigabits per second for high speed data protection
 
Hackers Gain Access To TripAdvisor Database
Data Protection : 28 March, 2011
LogRhythm comments on the recent announcement by TripAdvisor that unauthorised access had been gained to the company's membership database
 
Play.com Hack Reassurance Insufficient
Data Protection : 23 March, 2011
Stonesoft comments on the Play.com hack which compromised customer data saying that the low level of information is not an excuse for lax security practices
 
Play.com Customer Details Go Missing After Successful Hack
Data Protection : 23 March, 2011
Hackers have got away with names and e-mail addresses from the database of customers of online retailer Play.com
 
Poor Control Of Third Parties Leads To Data Leakage
Data Protection : 23 March, 2011
LogRhythm comments on the Play.com data loss and the need for tight control over third party access to critical and sensitive data in order to prevent data loss
 
Poor Investment Leaves Companies Short On Data Leakage Prevention
Data Protection : 21 March, 2011
Dimension Data comments on poor industry investment levels in Data Loss Prevention and provides advice on the need for securing data against potential leakage
 
Swiss Bank Takes Data Loss Prevention Solution From Check Point
Data Protection : 17 March, 2011
DLP Solution From Check Point provides Bank Leumi with protection from data loss incidents as the bank improves safeguards of customer data
 
The Demise of Token Based Two-Factor Authentication
Data Protection : 16 March, 2011
Andrew Kemshall of SecurEnvoy explains why tokens are a thing of the past and that the way forward is for tokenless two-factor authentication using SMS
 
Partnership Integrates Web Application Scanning With Security Testing
Data Protection : 15 March, 2011
NTO partners with Core Security Technologies to integrate NTOSpider vulnerability scanner with all the security testing offerings availabe from Core
 
Part 2 Of Generation G-Mail Report Examines Hidden Risk Of Restrictive E-mail Policies
Data Protection : 10 March, 2011
Mimecast continues to examine the protection of corporate data from inadvertent leakage through the provision of e-mail policy flexibility to cater for the latest generation of corporate e-mail users
 
Enhanced Insider Threat Protection With SecureSphere 8.5
Data Protection : 09 March, 2011
Imperva releases SecureSphere 8.5 with agent-based monitoring and auditing to bring additional protection to organisations from the insider threat
 
Report Outlines Criticality of Metadata Framework For Data Security
Data Protection : 08 March, 2011
The use of metadata framework technology is the subject of a report which examines data security strategies during explosive growth in unstructured data storage
 
Scalable Cryptography Management Platform
Data Protection : 08 March, 2011
Cryptosoft has released an encryption service platform that can be scalably deployed across a variety of environments including cloud, virtual or on-premises configurations
 
Securing Personal Laptops For Business Use
Data Protection : 07 March, 2011
With the increasing trend of companies providing a stipend to employees to buy their own laptops for both business and personal use, Nick Lowe of Check Point examines the security implications of this cost-saving measure
 
IPS Producer Takes Core Impact Pro For Penetration Testing
Data Protection : 07 March, 2011
Core Security Technologies has supplied security software supplier Top Layer Security with Core Impact Pro for validation of security measures and penetration testing of the company's Intrusion Prevention System
 
Cloud Based Management Of Endpoint Devices
Data Protection : 07 March, 2011
DESlock+ Enterprise Server has been released by Data Encryption Systems enabling cloud computing based policy encryption management of endpoints
 
Special Offer On Upgrade To DeviceLock 7
Data Protection : 03 March, 2011
DeviceLock is encouraging customers to upgrade to version 7 of the Endpoint DLP suite from the company with special incentives being offered
 
CeBIT Visitors Warned Of Risks Concerning Viruses On Flash Drives
Data Protection : 03 March, 2011
Companies are risking computer infection and data loss by allowing unknown USB drives to be plugged into their computers, warns BlockMaster
 
Alarming Increase In USB Sticks Being Left At UK Dry Cleaners
Data Protection : 02 March, 2011
A study in the UK has shown that as many as 17,000 removable USB memory devices are left in clothes pockets each year in the UK and being sent to the cleaners
 
Commercial E-mail Put At Risk By Generation Gmail
Data Protection : 24 February, 2011
Mimecast reveals the trend in office environments towards using web based e-mail providers for business correspondance potentially compromising corporate data assets
 
Arxan Enters Market For Biometric System Security
Data Protection : 24 February, 2011
Through partnership with iris recognition supplier, Arxan provides additional layer of security through its software for the biometric market
 
Conseal Remote Authentication To Be Delivered Through iomart
Data Protection : 24 February, 2011
Secure authentication cloud services offered by Conseal Security will be delivered by iomart Hosting under new agreement between the two companies
 
Mobile Employees Gain Single Sign-On and Strong Authentication
Data Protection : 23 February, 2011
Imprivata has introduced OneSign Anywhere to enable companies to provide remote access to mobile workers with strong authentication from mobile devices without software overhead
 
Endpoint DLP With Contextual COntrols
Data Protection : 23 February, 2011
DeviceLock 7.0 Endpoint DLP Suite provides enhanced Data Loss Prevention including contextual protocol control
 
Two Factor Authentication For Children's Hospital
Data Protection : 23 February, 2011
Gemalto is providing Protiva to Seattle Children's hospital for strong authentication to gain access to patient records
 
IT Governance Advises Wiser Spending Of Constrained IT Budgets
Data Protection : 21 February, 2011
WIth IT budgets shrinking and protection requirements becoming stronger, IT Governance is providing advice to companies on wise spending policies to get the most benefit from available funds
 
Centralised Control Of USB Devices Containing Sensitive Data
Data Protection : 21 February, 2011
The Conseal USB provides increased control over USB devices containing confidential information including cloud-based management console and the ability to wipe sensitive content
 
Insider Threat Risk Reduction
Data Protection : 17 February, 2011
Sean Glynn of Credant Technologies offers some insight into the theft of commercial information from people inside the organisation and investigates methods that can be used to reduce the threat of insider data theft
 
Vendor Alliance Program For USB Device Remote Management
Data Protection : 17 February, 2011
SafeConsoleReady from BlockMaster provides USB device manufacturers with access to secure USB device management platform
 
Database Activity Monitors Brings Enhanced Security To Green Mountain
Data Protection : 17 February, 2011
Coffee Roasters Gain Granular Search Capability As Part Of Its Security Information and Event Management System from NitroSecurity
 
Hardware Security Modules Meet NIST Cryptography Requirements
Data Protection : 16 February, 2011
Best practice guidelines from the National Institute of Standards and Technology for cryptographic algorithms are fully met by hardware security modules from Thales
 
Partnership Results In Hardware Encrypted Secure USB Drive
Data Protection : 16 February, 2011
BlockMaster has unveiled a new product at the RSA Conference for encrypted secure data storage on USB resulting from the company's partnership with Kingston Digital
 
HDD Manufacturer Parterns With DES For Disk Protection
Data Protection : 16 February, 2011
DESlock+ licences will be supplied for system protection to purchasers of CnM Core external hard disk drives
 
Managed Tokenisation Service For Personally Identifiable Information
Data Protection : 16 February, 2011
Cloud based tokenisation as a service offering from nuBridges brings improved security and compliance for electronic health records and personally identifiable information
 
High Performance Enpoint Protection For Virtual Environments
Data Protection : 16 February, 2011
Symantec has re-released two versions of the company's Endpoint Protection product with faster performance and advanced protection for endpoints
 
Integrated Vulnerability Scanner For Database Security Manager
Data Protection : 15 February, 2011
At version 4.1, LogLogic's Database Security Manager improves insight into database user activities and scans for potential security weaknesses
 
SMS Authentication Added To PINsafe
Data Protection : 15 February, 2011
Authentication technology from Swivel Secure gains additional functionality at v3.8 including in-bound SMS authentication capability
 
Management of Privileged Sessions Reduces Insider Threat
Data Protection : 15 February, 2011
Cyber-Ark releases the Privileged Session Management Suite for protection of data assets and servers from a range of security threats
 
RSA Integration Demonstration for Access Assurance Suite
Data Protection : 14 February, 2011
Courion is attending the RSA Conference in San Francisco this week where it will be demonstrating the integration of the Access Assurance Suite with RSA solutions
 
A Fifth Of Commercial IT Attacks Come From Insiders
Data Protection : 11 February, 2011
CyberSecurity Survey reveals that over 20% of attacks on organisation's IT systems originate from people who have some form of authorised access, whether as employees or contractors
 
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo