Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Data Protection
Penetration Testing For Application Developers
Data Protection : 11 January, 2011
Pentura's new secure application development service provides penetration testing expertise to software developers and consultancies
 
Full Disk Encryption For Windows, Mac and Linux
Data Protection : 10 January, 2011
SecureDoc v5 is now available from WinMagic bringing seamless data protection through full disk encryption for a range of popular desktop operating systems
 
US Government Hunts Down Disgruntled Employee Threats
Data Protection : 10 January, 2011
Imperva comments on reports of increased US government activity on combating insider threats in the wake of the recent Wikileaks scandal
 
Prime Changes Predicted For IT Security in 2011
Data Protection : 10 January, 2011
John Colley of (ISC)2 is making predictions for how the information security landscape will change in fundamental ways during 2011
 
Yorkshire Post Public Snooping Revelations Come As No Surprise
Data Protection : 07 January, 2011
Cyber-Ark comments on the revelation of trusted public sector workers using their privileges to snoop through private records and believes that this is no rare phenomenon
 
ASUS Selects Solid State Memory From SanDisk
Data Protection : 07 January, 2011
Secure solid state drives from SanDisk to be incorporated into the new Eee Slate Tablet available from ASUS
 
USB Drives From SanDisk Now Feature Encryption and Online Backup
Data Protection : 07 January, 2011
SanDisk is providing additional security for mobile workers to reduce data loss on the move with the introduction of SecureAccess software for encryption and online backup on the company’s range of retail USB drives
 
Lost Mobile Devices Remain Unclaimed At BritainÃÂÃâ€ÂÃâ€Âs Airports
Data Protection : 21 December, 2010
With increased levels of travel approaching over the Christmas break, Credant Technologies is issuing a warning concerning the annual epidemic of leaving laptops and mobile phones behind at airports and railway stations
 
Survey Reveals Attitudes To Corporate Data Loss
Data Protection : 20 December, 2010
The significance of losing corporate data is still not fully understood in the user community according to the results of a survey conducted by BlockMaster
 
MOD Strengthens Defence Against Hackers
Data Protection : 17 December, 2010
UK Minister announces improved defences for the Ministry Of Defence to protect against a range of cyber-threats including leaks and hacking
 
Password Vulnerability Highlighted In Social Networking Hack
Data Protection : 14 December, 2010
GrIDsure comments on the Gawker Media and Twitter hack explaining how passcode generation can protect against such vulnerabilities
 
Symantec Examines Challenges Which Lie Ahead In 2011
Data Protection : 13 December, 2010
Cloud computing will be high on the list of challenges for IT security professionals in 2011 along with social media and mobile security, according to report from Symantec
 
Biometrics Still Being Left Behind for Logical Access Control
Data Protection : 10 December, 2010
Siemens reports on the low uptake of biometric technology despite the ever increasing needs for secure access to sensitive data
 
Passmark Ranks Endpoint Protection Software Highly
Data Protection : 09 December, 2010
Symantec's Endpoint Protection Small Business Edition has been recognised in performance tests by PassMark
 
Insider Threat Protection Takes On New Level In Light Of Wikileaks
Data Protection : 09 December, 2010
The UK Government has ramped up protection levels in the fight against insider threats as Wikileaks ruffles feathers in the corridors of power
 
Legal Expert Joins Imperva Board
Data Protection : 08 December, 2010
Imperva has recruited a new Chief Financial Officer to head the company's financial, legal, IT, facilities management and Human Resources functions
 
Data Breach Survey Identifies Snooping As A Growing Risk
Data Protection : 08 December, 2010
Workers regularly put themselves at risk from ÃâÅ"visual data breaches" also known as shoulder-surfing where information displayed on their screens is easily readable by adjacent people, increasing risks of data leakage through snooping
 
Strong Authentication System For Use On Trading Floors
Data Protection : 08 December, 2010
Protiva One4all has been released by Gemalto for use as a strong authentication system for traders operating across multiple terminals on trading floors
 
CMI Enters Distribution Agreement With BitDefender
Data Protection : 08 December, 2010
BitDefender fill a hole in the UK reseller market by providing greater access to its products through local distributor, CMI
 
Wikileaks Indicates Level Of Insecure Sensitive Data
Data Protection : 07 December, 2010
Lumension comments on the spate of Wikileaks revelations and highlights the growing concerns over sensitive data security
 
Free White Paper Available On Benefits Of Virtualisation
Data Protection : 06 December, 2010
ISACA issues technical document that examines both the benefits and challenges associated with implementing a virtual environment and how to minimize risks during implementation
 
USB Device Usage Becoming More Difficult To Control
Data Protection : 02 December, 2010
Unencrypted USB memory device usage in business environment endemic with poor control in evidence for maintaining data security
 
Penetration Testing vs Ethical Hacking
Data Protection : 30 November, 2010
Anthony Haywood of Idappcom explains the flaws in the use of bounty seeking ethical hackers to test your applications rather than application testing at the design stage
 
Ignoring The Insider Threat Can Lead To Incidents Such as The Wikileak Saga
Data Protection : 30 November, 2010
Imperva explains the benefits of tackling the insider threat and actively managing access to data to prevent embarrassing public leaks
 
Considering Human Factors In Vulnerability Assessment
Data Protection : 26 November, 2010
Giri Sivanesen of Pentura discusses the exploitation of people in launching cyber attacks on businesses with advice on how to factor this consideration into overall vulnerability assessment
 
Expensive Data Leak Demonstrates Need For PIM
Data Protection : 16 November, 2010
Banker loses General Motor flotation underwriting contract through failure to protect data from leakage as details of the transaction gets e-mailed to unauthorised users
 
Online Shopping From The Workplace Advice From ISACA
Data Protection : 10 November, 2010
Rapidly approaching holiday season brings online shopping perils to both employees and employers as the workplace is being increasingly being used as the base for shopping online
 
Password Disclosure Levels Remain High For Web Users
Data Protection : 10 November, 2010
Study from BitDefender shows that as many as 12% of web users disclose their passwords inappropriately
 
Employee Fraud Still Low On List Of Industry Priorities
Data Protection : 10 November, 2010
Shred-It contributes to International Fraud Awareness Week with advice to businesses on protecting themselves from increasing incidences of fraud committed by employees
 
PKI Based Bridge For Defence Industry
Data Protection : 09 November, 2010
CertifyID Armored from WISeKey provides strong encrypted mobile communications in compliance with defence industry requirements
 
Financial Services Operator Takes DbProtect From Application Security
Data Protection : 08 November, 2010
Think Money is protecting its database assets and ensuring compliance through the protection of sensitive data with the use of the DbProtect database protection solution from Application Security
 
Bank Clients Demand High IT Security
Data Protection : 08 November, 2010
Imperva comments on the growing trend for banking customers to change banks if they don't feel security is being taken seriously enough
 
Synovus Bank tighten security and access controls through Novell Identity Manager
Data Protection : 07 November, 2010
A multi-chartered financial services company with 30 different banks, Synovus Financial was looking to automate user provisioning and streamline access management. By using Novell Identity Manager and Novell Secure Login, Synovus has tightened security while vastly reducing IT costs.
 
Corporate Re-Branding At MXI Security
Data Protection : 05 November, 2010
With the launch of a new web site and rebranding the company's product set, MXI Software is seeking to strengthen its position in the market for secure USB products
 
PINsafe Buffers Users From SMS Based Zeus Vulnerabilities
Data Protection : 03 November, 2010
Fears of SMS based authentication being vulnerable have been declared by Swivel Secure as irrelevant to PINsafe which provides one time codes without transmission of PIN numbers either by SMS or on a website
 
Human Factors Prevail In Data Loss Incidents
Data Protection : 02 November, 2010
Alexei Lesnykh of DeviceLock puts recent data loss incidents and industry reports into perspective and suggests the human factor is predominant in the prevention of losses in an industry where IT has become consumerised and cyber-criminals are become more focused in their targets
 
Cyber Espionage Prevention Requires Control of the Weakest Link
Data Protection : 02 November, 2010
Giri Sivanesen, a senior security consultant at Pentura, explains how the human factor is the greatest threat to information security and how hackers and cyber criminals are increasingly employing an espionage-style approach to reaching their target information through human weaknesses
 
Middle East Distributor Appointed For Tokenless Authentication
Data Protection : 02 November, 2010
Optimus will now handle Swivel Secure distribution, bringing tokenless two-factor authentication technology using PINsafe to the Middle Eastern market
 
Demographic Trend Analysis For Personal Data Loss
Data Protection : 01 November, 2010
Garlick has analysed data loss and theft incidents in the UK and provide a breakdown of demographics with men being 60% more likely to suffer unauthorised personal data disclosure than women
 
Full Disk Hardware Encryption Features On Cipher Raid Tower
Data Protection : 29 October, 2010
Advanced security for disk-based data with the Cipher Raid Tower from Addonics with AES 256-bit full disk encryption
 
Annual Congress Of ISF Members
Data Protection : 29 October, 2010
Monaco will host the 21st Annual Congress of the Information Security Forum to be held during November
 
IT Governance Underscores UK Cyber-Attack Risk
Data Protection : 28 October, 2010
The UK National Security Strategy's escalation of Cyber threats to a tier 1 risk is given further weight by IT Governance which links the cyber attack threat with other security risks
 
Hacking Attempt Fails To Compromise USB Hard Drive
Data Protection : 28 October, 2010
PIN code protected encrypted USB hard drive from iStorage undergoes extensive hacking attempt with the data remaining intact
 
Secure Service Platform Keeps Ex-Pat Moroccans In Touch With Home
Data Protection : 28 October, 2010
WISeKey technology is keeping information used by Moroccans living abroad secure during the World Economic Forum
 
Host Based Encryption Enables Cost Reduced Data Protection
Data Protection : 28 October, 2010
Encryption on the fly is available as a scalable and cost-effective hosted service to be available from Emulex through the company's channel partner program
 
Securing Against Cyber Crime Through Ethical Hacking
Data Protection : 27 October, 2010
UK based Encription explains how penetration testing can benefit UK organisations in preventing them from becoming the victims of cyber-crime
 
Advice On Building Password Policies To Overcome Improvements In Cracking Techniques
Data Protection : 27 October, 2010
Chris Stoneff of Lieberman Software provides information on remaining a step ahead of password crackers by employing stronger password policy rules and procedures
 
Imperva Looks Further Into Botnet Rental Implications
Data Protection : 27 October, 2010
IT Security company Imperva delves deeper into the Iranian Cyber Army botnet rental intention and answers key questions on what this means in reality
 
ICA Botnet Sale Increases Need For Strong Security
Data Protection : 27 October, 2010
AEP Networks comments on the Iranian Cyber Army's intention to hire out access to botnets
 
Hardware Encrypted High Capacity USB Drive
Data Protection : 27 October, 2010
The CX-Ranger/E from Ciphertex brings 5 Terabyte portable storage connected using USB to the market with AES 256-bit hardware encryption
 
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo