Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Data Protection
Securing Against Cyber Crime Through Ethical Hacking
Data Protection : 27 October, 2010
UK based Encription explains how penetration testing can benefit UK organisations in preventing them from becoming the victims of cyber-crime
 
Advice On Building Password Policies To Overcome Improvements In Cracking Techniques
Data Protection : 27 October, 2010
Chris Stoneff of Lieberman Software provides information on remaining a step ahead of password crackers by employing stronger password policy rules and procedures
 
Imperva Looks Further Into Botnet Rental Implications
Data Protection : 27 October, 2010
IT Security company Imperva delves deeper into the Iranian Cyber Army botnet rental intention and answers key questions on what this means in reality
 
ICA Botnet Sale Increases Need For Strong Security
Data Protection : 27 October, 2010
AEP Networks comments on the Iranian Cyber Army's intention to hire out access to botnets
 
Hardware Encrypted High Capacity USB Drive
Data Protection : 27 October, 2010
The CX-Ranger/E from Ciphertex brings 5 Terabyte portable storage connected using USB to the market with AES 256-bit hardware encryption
 
Critical Java Vulnerability Remains Largely Unpatched
Data Protection : 26 October, 2010
Trusteer is warning of a significant vulnerability to internet users who remain unpatched against java exploit flaw
 
Hackers Get Smarter With ZeuS Exploits
Data Protection : 26 October, 2010
Imperva reports on the trends being taken by cyber criminals to diversify their methods and make the best use of the most successful hacking and phishing tools currently available
 
Mislaid USB Stick Containing Nuclear Facility Details Found in Hotel Room
Data Protection : 19 October, 2010
Unencrypted data on lost USB device causes embarrassment to nuclear authorities based on data contained regarding transfer of operations and readiness of nuclear authorities
 
Advice On Sensitive Material Storage and Disposal
Data Protection : 19 October, 2010
As part of the National Identity Fraud Prevention Week underway in the UK, Shred-it is providing advice on preventing corporate fraud through effectively securing sensitive information
 
National Fraud Authority Comment
Data Protection : 19 October, 2010
SentryBay comments on the revelation by the National Fraud Authority that as many as 2 million people become victims of some kind of identity fraud annually
 
Preventing Cyber-Espionage
Data Protection : 18 October, 2010
SecureWorks CTO provides an explanation of the cyber espionage threat to government bodies and major organisations and offers advice on how to avoid such a threat
 
The ICO Steps In On Healthcare Data Loss Incident
Data Protection : 18 October, 2010
Healthcare recruitment company falls foul of the Data Protection Act after losing doctor's personal data
 
One Time Password System From Facebook A step in The Right Direction
Data Protection : 15 October, 2010
GrIDsure comments on the recent changes to Facebook security and suggests password alternative system to further increase security levels
 
Facebook Launches Two-Factor Authentication Option For Mobile Users
Data Protection : 14 October, 2010
One-Time Passwords available by text messages for facebook users as part of the latest security improvements offered by the popular social networking site
 
Payment Authentication Systems To Use GrIDsure
Data Protection : 14 October, 2010
Partnership with Modirum gives GrIDsure access to the payment authentication market for the company's unique pattern recognition based access control technology
 
Managed Full Disk Encryption Service For Canadian University
Data Protection : 11 October, 2010
WinMagic is supplying a University in Canada with managed security services for data protection and full disk encryption for laptops, desktops and removable media
 
Blue Cube Relocates To New Office
Data Protection : 11 October, 2010
Larger Head Office enables Blue Cube to take advantage of new international marketing opportunities
 
Colt Takes Layer-2 Encryption From InfoGuard
Data Protection : 11 October, 2010
Managed service for high speed European networks to benefit from layer-2 encryption meeting e-Privacy directives in the region as a result of partnership between Colt and InfoGuard
 
Preventing Corporate Data Loss During Disruptive Transport Strike
Data Protection : 05 October, 2010
AEP Networks comments on the requirement for data loss protection with many workers operating from home during London underground strike
 
Tube Strike Tempts Workers Into Breaking Data Protection Rules
Data Protection : 05 October, 2010
Lumension is warning of the likelihood of increased amounts of corporate data being offloaded onto USB flash memory to enable workers to operate from home during tube strike
 
Threat Horizon Report Examines Security To 2012
Data Protection : 04 October, 2010
The IT security landscape for 2012 comes under the spotlight in a new Threat Horizon report issued by the Information Security Forum
 
Removing Expertise From Online Access Improves Security
Data Protection : 01 October, 2010
GrIDsure founder comments on the need for simplified highly secure access control to prevent breaches due to lack of expertise in the user community
 
Network Based Protection Insufficient to Thwart Stuxnet
Data Protection : 01 October, 2010
Veracode comments on the severity of Advanced Persistent Threats like the Stuxnet worm and advises an alternative approach to critical infrastructure security involving the use of code verification techniques to ensure back doors are tightly closed
 
Estate Agent Data Theft Highlights Dangers Of Insider Threat
Data Protection : 01 October, 2010
Overtis explains how privileged access management can assist in the prevention of high value data loss through theft by trusted employees
 
French Mobile Phone Hack Due To Insider Fraud
Data Protection : 30 September, 2010
Consequences of failing to protect critical data from being abused by insiders illustrated in mobile phone hack discovered in France involving illegal online sales of SIM card unlock codes
 
Fortify Comments On German ID Card Hack
Data Protection : 30 September, 2010
German national ID card exposure consistent with failure to design and integrate security into the system from the beginning, according to Fortify Software
 
Security Budget Spending In Constrained Times
Data Protection : 29 September, 2010
Bob Heard of Credant Technologies analyses how IT security can maintained whilst working within constrained budgets and without compromising data integrity
 
Data Storage Management Challenges
Data Protection : 28 September, 2010
Imperva examines data storage requirements to enable correct levels of access without unnecessary duplication and without compromising security requirements
 
High Visibility Enterprise Threat and Risk Management
Data Protection : 21 September, 2010
The new release of ETRM platform from ArcSight brings improved visibility of risk and threat management across the enterprise
 
Security System Testing and Optimisation Tool
Data Protection : 21 September, 2010
Traffic IQ V2.0 from Idappcom provides the necessary tools to harden defences against hacking and optimise security appliances within the organisation.
 
Advice For companiestest Supporting National Work From Home Day
Data Protection : 21 September, 2010
Shred-IT is providing some tips for companies on how to avoid data breaches whilst employees work from home during the national work from home day taking place in the UK this week
 
Single Sign-On Integrated With PalmSecure For Biometric Authentication
Data Protection : 20 September, 2010
Passlogix and Fujitsu have integrated the PalmSecure vascular biometric recognition technology with v-GO Single Sign-On to add biometrics to two-factor access control and user authentication
 
Web Application Firewalls Rank Highly In Data Protection Tables
Data Protection : 16 September, 2010
Survey by Imperva and Securosis finds that a mixture of traditional approaches and modern data security technology provides the right environment for preventing data breaches
 
Preventing Data Leakage Through Reducing Employee Mistakes
Data Protection : 16 September, 2010
Nick Lowe of Check Point discusses the loss of data through employee error and suggests ways of applying preventive measures to reduce these instances of non-malicious data loss incidents
 
Core Insight Enterprise Released to Beta Customers
Data Protection : 15 September, 2010
Large global enterprises sign up for beta testing on the latest security testing and measurement appliance from Core Security Technologies, bringing prioritised testing regime to business critical applications
 
Full-Disk Encryption From WinMagic Supports Intel Anti-Theft Technology
Data Protection : 15 September, 2010
New Intel processors with encryption and anti-theft technology now supported by the SecureDoc Full Disk Encryption product available from WinMagic
 
Avoiding the hidden costs of the mobile workforce
Data Protection : 14 September, 2010
Colin Woodland of IronKey examines data safety and the costs associated with data breaches as the risks become higher with increasing levels of workforce mobility
 
Football Fan Passport Data Sale Scandal
Data Protection : 13 September, 2010
Football's governing body is under investigation from the ICO due to allegations of the sale of passport data from football fans to ticket sales agents
 
Wireless Hacking Study Shows Vulnerability Of Vehicle Software Systems
Data Protection : 07 September, 2010
Fortify urges car makers to build security into the ever-increasing amounts of code used in on-board vehicle computers preventing potential drive-by attacks of vehicle locking and ignition systems providing easy access for car thieves
 
Encrypted Flash Drives For Linux and Mac
Data Protection : 06 September, 2010
The Kanguru Defender Elite encrypted thumb drive with AES 256 hardware encryption is now available for use on Mac and Linux platforms
 
Dell Bundles Privileged Identity Management On PowerEdge Server Models
Data Protection : 03 September, 2010
Cyber-Ark has reached an OEM agreement with Dell for equipping the company's PowerEdge rack mounted servers with the Cyber-Ark privileged identity management suite
 
Privacy Breach Detection Software Fro Texas Hospital
Data Protection : 03 September, 2010
FairWarning is supplying a large not-for-profit hospital in Texas with software to enable the institution to become compliant with patient data privacy standards
 
ISACA Milestone In Risk Certification
Data Protection : 02 September, 2010
The 1000th certificate in Risk and Information Systems Control has been issued by ISACA
 
Online Travel Company Takes Security Blanket From TCS
Data Protection : 27 August, 2010
The ezRez online travel software company takes automatic lockdown tool for PCI DSS compliance from Trusted Computer Solutions
 
Inside The Mind Of A Hacker
Data Protection : 27 August, 2010
Pete Wood of the ISACA Security Advisory Group provides some background detail on how hackers operate and what is necessary to gain protection from their criminal activities
 
Blue Cube Partners With Secure Flash Drive Supplier
Data Protection : 27 August, 2010
Kanguru Solutions joins Blue Cube in partnership to extend the company's encrypted USB flash drive suite of products
 
Hospital Breaches Data Security Regulations With Unencrypted Data Loss
Data Protection : 26 August, 2010
Cyber-Ark comments on the unacceptability of transferring data using unencrypted removable media when secure data transfer technology is so readily and widely available
 
Policy Enforcement Crucial In Avoiding Expensive Data Loss Incidents
Data Protection : 26 August, 2010
Overtis uses the recent FSA penalty of over 2 million pounds on Zurich Insurance to illustrate the benefits of user activity management and policy enforcement technology to prevent such costly incidents of sensitive data leakage
 
CESG Kite Mark Awarded To SafeStick
Data Protection : 26 August, 2010
Secure USB drive from BlockMaster successfully undergoes UK government testing program resulting in CESG Claims Test Mark certifying security functionality
 
Privacy Protection For US Small Health Care Providers
Data Protection : 26 August, 2010
Privacy auditing and data breach detection software from FairWarning is now available at reduced cost to small and medium sized health care providers in the USA
 
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com