Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Data Protection
Expensive Data Leak Demonstrates Need For PIM
Data Protection : 16 November, 2010
Banker loses General Motor flotation underwriting contract through failure to protect data from leakage as details of the transaction gets e-mailed to unauthorised users
 
Online Shopping From The Workplace Advice From ISACA
Data Protection : 10 November, 2010
Rapidly approaching holiday season brings online shopping perils to both employees and employers as the workplace is being increasingly being used as the base for shopping online
 
Password Disclosure Levels Remain High For Web Users
Data Protection : 10 November, 2010
Study from BitDefender shows that as many as 12% of web users disclose their passwords inappropriately
 
Employee Fraud Still Low On List Of Industry Priorities
Data Protection : 10 November, 2010
Shred-It contributes to International Fraud Awareness Week with advice to businesses on protecting themselves from increasing incidences of fraud committed by employees
 
PKI Based Bridge For Defence Industry
Data Protection : 09 November, 2010
CertifyID Armored from WISeKey provides strong encrypted mobile communications in compliance with defence industry requirements
 
Financial Services Operator Takes DbProtect From Application Security
Data Protection : 08 November, 2010
Think Money is protecting its database assets and ensuring compliance through the protection of sensitive data with the use of the DbProtect database protection solution from Application Security
 
Bank Clients Demand High IT Security
Data Protection : 08 November, 2010
Imperva comments on the growing trend for banking customers to change banks if they don't feel security is being taken seriously enough
 
Synovus Bank tighten security and access controls through Novell Identity Manager
Data Protection : 07 November, 2010
A multi-chartered financial services company with 30 different banks, Synovus Financial was looking to automate user provisioning and streamline access management. By using Novell Identity Manager and Novell Secure Login, Synovus has tightened security while vastly reducing IT costs.
 
Corporate Re-Branding At MXI Security
Data Protection : 05 November, 2010
With the launch of a new web site and rebranding the company's product set, MXI Software is seeking to strengthen its position in the market for secure USB products
 
PINsafe Buffers Users From SMS Based Zeus Vulnerabilities
Data Protection : 03 November, 2010
Fears of SMS based authentication being vulnerable have been declared by Swivel Secure as irrelevant to PINsafe which provides one time codes without transmission of PIN numbers either by SMS or on a website
 
Human Factors Prevail In Data Loss Incidents
Data Protection : 02 November, 2010
Alexei Lesnykh of DeviceLock puts recent data loss incidents and industry reports into perspective and suggests the human factor is predominant in the prevention of losses in an industry where IT has become consumerised and cyber-criminals are become more focused in their targets
 
Cyber Espionage Prevention Requires Control of the Weakest Link
Data Protection : 02 November, 2010
Giri Sivanesen, a senior security consultant at Pentura, explains how the human factor is the greatest threat to information security and how hackers and cyber criminals are increasingly employing an espionage-style approach to reaching their target information through human weaknesses
 
Middle East Distributor Appointed For Tokenless Authentication
Data Protection : 02 November, 2010
Optimus will now handle Swivel Secure distribution, bringing tokenless two-factor authentication technology using PINsafe to the Middle Eastern market
 
Demographic Trend Analysis For Personal Data Loss
Data Protection : 01 November, 2010
Garlick has analysed data loss and theft incidents in the UK and provide a breakdown of demographics with men being 60% more likely to suffer unauthorised personal data disclosure than women
 
Full Disk Hardware Encryption Features On Cipher Raid Tower
Data Protection : 29 October, 2010
Advanced security for disk-based data with the Cipher Raid Tower from Addonics with AES 256-bit full disk encryption
 
Annual Congress Of ISF Members
Data Protection : 29 October, 2010
Monaco will host the 21st Annual Congress of the Information Security Forum to be held during November
 
IT Governance Underscores UK Cyber-Attack Risk
Data Protection : 28 October, 2010
The UK National Security Strategy's escalation of Cyber threats to a tier 1 risk is given further weight by IT Governance which links the cyber attack threat with other security risks
 
Hacking Attempt Fails To Compromise USB Hard Drive
Data Protection : 28 October, 2010
PIN code protected encrypted USB hard drive from iStorage undergoes extensive hacking attempt with the data remaining intact
 
Secure Service Platform Keeps Ex-Pat Moroccans In Touch With Home
Data Protection : 28 October, 2010
WISeKey technology is keeping information used by Moroccans living abroad secure during the World Economic Forum
 
Host Based Encryption Enables Cost Reduced Data Protection
Data Protection : 28 October, 2010
Encryption on the fly is available as a scalable and cost-effective hosted service to be available from Emulex through the company's channel partner program
 
Securing Against Cyber Crime Through Ethical Hacking
Data Protection : 27 October, 2010
UK based Encription explains how penetration testing can benefit UK organisations in preventing them from becoming the victims of cyber-crime
 
Advice On Building Password Policies To Overcome Improvements In Cracking Techniques
Data Protection : 27 October, 2010
Chris Stoneff of Lieberman Software provides information on remaining a step ahead of password crackers by employing stronger password policy rules and procedures
 
Imperva Looks Further Into Botnet Rental Implications
Data Protection : 27 October, 2010
IT Security company Imperva delves deeper into the Iranian Cyber Army botnet rental intention and answers key questions on what this means in reality
 
ICA Botnet Sale Increases Need For Strong Security
Data Protection : 27 October, 2010
AEP Networks comments on the Iranian Cyber Army's intention to hire out access to botnets
 
Hardware Encrypted High Capacity USB Drive
Data Protection : 27 October, 2010
The CX-Ranger/E from Ciphertex brings 5 Terabyte portable storage connected using USB to the market with AES 256-bit hardware encryption
 
Critical Java Vulnerability Remains Largely Unpatched
Data Protection : 26 October, 2010
Trusteer is warning of a significant vulnerability to internet users who remain unpatched against java exploit flaw
 
Hackers Get Smarter With ZeuS Exploits
Data Protection : 26 October, 2010
Imperva reports on the trends being taken by cyber criminals to diversify their methods and make the best use of the most successful hacking and phishing tools currently available
 
Mislaid USB Stick Containing Nuclear Facility Details Found in Hotel Room
Data Protection : 19 October, 2010
Unencrypted data on lost USB device causes embarrassment to nuclear authorities based on data contained regarding transfer of operations and readiness of nuclear authorities
 
Advice On Sensitive Material Storage and Disposal
Data Protection : 19 October, 2010
As part of the National Identity Fraud Prevention Week underway in the UK, Shred-it is providing advice on preventing corporate fraud through effectively securing sensitive information
 
National Fraud Authority Comment
Data Protection : 19 October, 2010
SentryBay comments on the revelation by the National Fraud Authority that as many as 2 million people become victims of some kind of identity fraud annually
 
Preventing Cyber-Espionage
Data Protection : 18 October, 2010
SecureWorks CTO provides an explanation of the cyber espionage threat to government bodies and major organisations and offers advice on how to avoid such a threat
 
The ICO Steps In On Healthcare Data Loss Incident
Data Protection : 18 October, 2010
Healthcare recruitment company falls foul of the Data Protection Act after losing doctor's personal data
 
One Time Password System From Facebook A step in The Right Direction
Data Protection : 15 October, 2010
GrIDsure comments on the recent changes to Facebook security and suggests password alternative system to further increase security levels
 
Facebook Launches Two-Factor Authentication Option For Mobile Users
Data Protection : 14 October, 2010
One-Time Passwords available by text messages for facebook users as part of the latest security improvements offered by the popular social networking site
 
Payment Authentication Systems To Use GrIDsure
Data Protection : 14 October, 2010
Partnership with Modirum gives GrIDsure access to the payment authentication market for the company's unique pattern recognition based access control technology
 
Managed Full Disk Encryption Service For Canadian University
Data Protection : 11 October, 2010
WinMagic is supplying a University in Canada with managed security services for data protection and full disk encryption for laptops, desktops and removable media
 
Blue Cube Relocates To New Office
Data Protection : 11 October, 2010
Larger Head Office enables Blue Cube to take advantage of new international marketing opportunities
 
Colt Takes Layer-2 Encryption From InfoGuard
Data Protection : 11 October, 2010
Managed service for high speed European networks to benefit from layer-2 encryption meeting e-Privacy directives in the region as a result of partnership between Colt and InfoGuard
 
Preventing Corporate Data Loss During Disruptive Transport Strike
Data Protection : 05 October, 2010
AEP Networks comments on the requirement for data loss protection with many workers operating from home during London underground strike
 
Tube Strike Tempts Workers Into Breaking Data Protection Rules
Data Protection : 05 October, 2010
Lumension is warning of the likelihood of increased amounts of corporate data being offloaded onto USB flash memory to enable workers to operate from home during tube strike
 
Threat Horizon Report Examines Security To 2012
Data Protection : 04 October, 2010
The IT security landscape for 2012 comes under the spotlight in a new Threat Horizon report issued by the Information Security Forum
 
Removing Expertise From Online Access Improves Security
Data Protection : 01 October, 2010
GrIDsure founder comments on the need for simplified highly secure access control to prevent breaches due to lack of expertise in the user community
 
Network Based Protection Insufficient to Thwart Stuxnet
Data Protection : 01 October, 2010
Veracode comments on the severity of Advanced Persistent Threats like the Stuxnet worm and advises an alternative approach to critical infrastructure security involving the use of code verification techniques to ensure back doors are tightly closed
 
Estate Agent Data Theft Highlights Dangers Of Insider Threat
Data Protection : 01 October, 2010
Overtis explains how privileged access management can assist in the prevention of high value data loss through theft by trusted employees
 
French Mobile Phone Hack Due To Insider Fraud
Data Protection : 30 September, 2010
Consequences of failing to protect critical data from being abused by insiders illustrated in mobile phone hack discovered in France involving illegal online sales of SIM card unlock codes
 
Fortify Comments On German ID Card Hack
Data Protection : 30 September, 2010
German national ID card exposure consistent with failure to design and integrate security into the system from the beginning, according to Fortify Software
 
Security Budget Spending In Constrained Times
Data Protection : 29 September, 2010
Bob Heard of Credant Technologies analyses how IT security can maintained whilst working within constrained budgets and without compromising data integrity
 
Data Storage Management Challenges
Data Protection : 28 September, 2010
Imperva examines data storage requirements to enable correct levels of access without unnecessary duplication and without compromising security requirements
 
High Visibility Enterprise Threat and Risk Management
Data Protection : 21 September, 2010
The new release of ETRM platform from ArcSight brings improved visibility of risk and threat management across the enterprise
 
Security System Testing and Optimisation Tool
Data Protection : 21 September, 2010
Traffic IQ V2.0 from Idappcom provides the necessary tools to harden defences against hacking and optimise security appliances within the organisation.
 
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com