Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Special Report
Defeating Denial Of Service Attacks
Anti-virus and anti-malware software : 05 September, 2011
Imperva Product Manager examines DDos Attacks and looks at how they can be defeated
 
Trusteer Dispels The Myths Around Mobile Malware
Mobile computing security : 16 August, 2011
Amit Klein of Trusteer explains why malware delivered to mobile devices should be taken seriously because the market is now ripe for cyber-criminals to exploit
 
Consumerisation in The Workplace Exacerbates The Insider Threat
Data Protection : 08 August, 2011
Imperva's Amichai Sulman discusses the extent of the insider threat within the UK workforce and the role played by the increasing consumerisation of IT in the workplace
 
Providing Corporate IT Users With More Security Responsibility
Data Protection : 20 July, 2011
Terry Greer-King of Check Point examines the security problem resulting from the consumerisation of IT in the workplace and suggests placing more responsibility on the user of such devices
 
Critical National Infrastructure Protection From Cyber-Attacks
Critical Infrastructure Protection : 12 July, 2011
Rob Rachwald and Noa Bar Yosef from Imperva provide some insight into means of preventing damage to critical national infrastructure from cyber attacks
 
Smartphone Security Timebomb Continues Ticking
Mobile computing security : 12 July, 2011
Trusteer explains why hackers are two steps ahead of the mobile security industry and are ready to exploit vulnerabilities on Android and iOS devices when they become more widely used for on-line mobile banking applications
 
Living Dangerously With New Technology
Data Protection : 30 June, 2011
Jane Grafton, Director of Business Development at Lieberman Software takes a look at the pitfalls facing IT security professionals and provides five simple rules for keeping your job
 
Learning From The Year's Most Significant Security Breaches
Data Protection : 24 June, 2011
Check Point analyses the year so far with a trend for more sophisticated and targeted attacks and what companies and organisations can learn from them
 
Raising the Bar On Detecting And Preventing Malicious Code Attacks
Data Protection : 22 June, 2011
Ray Bryant of Idappcom details the need and the methods of preventing malicious code attacks by hybridisation during a time when cyber criminals are becoming more sophisticated
 
Exponential Growth Expected In Attacks On Mobile Devices
Mobile computing security : 17 June, 2011
Imperva examines the growth in the use of mobile devices for corporate computing and the security implications as hackers gear up faster than the security industry
 
Replacement Token Considerations After The RSA Hack
Data Protection : 16 June, 2011
SecurEnvoy provides insight into the considerations that should be taken by SecurID token users in the aftermath of the March hack on RSA
 
Ensuring Security On Corporate Mobile Devices
Mobile computing security : 16 June, 2011
WIth the security edges continuing to become more blurred in portable computing, Origin Storage examines the growing requirements for security solutions for the protection of smartphones and other mobile computing devices
 
IT Outsourcing Golden Rules
Cloud Computing Security : 15 June, 2011
Philip Lieberman answers the question of how to successfully implement an outsourcing program without exposing your company to the inherent dangers
 
NFC Brings In New Era For Identity and Access Management
ID cards and smart cards : 31 May, 2011
HID Global discusses the changes taking place in identity credentials and explains the move away from ID cards towards the use of NFC enabled mobile communications technology
 
The Impact Of Social Engineering Techniques On Malware Distribution
Data Protection : 14 April, 2011
Trusteer discusses how social engineering methods used by hackers can leave companies vulnerable to attacks regardless of time spent educating employees on being aware of the techniques used
 
Cutting IT Security Spending Wisely
Exhibitions and Trade Shows : 12 April, 2011
In the light of Government spending cuts in the UK, Will Hogan of Idappcom examines the ways available to reduce spending without reducing the levels of protection required in the corporate environment
 
How State Sponsored Advanced Persistent Threats Are On The Rise
Data Protection : 05 April, 2011
Amichai Shulman of Imperva takes an in-depth look at the migration of cyber-threats towards Advanced Persistent Threats and what this means to global risks
 
NASA IT Vulnerability Demonstrates Requirements For Greater Education In IT Security
Trade Organisations, User Groups and Pressure Groups : 04 April, 2011
Organisers of the Infosecurity Europe event to be held in London comment on the recent revelation of the vulnerabilities and risks inherent in the IT security systems of NASA
 
The Use Of Self-Encrypting Drives For Data Protection
Exhibitions and Trade Shows : 18 March, 2011
Michael Willett of Trusted Computing Group explains the difference between Self Encrypting Drives and Software-based Full Drive Encryption when it comes to ability to protect data
 
The Demise of Token Based Two-Factor Authentication
Data Protection : 16 March, 2011
Andrew Kemshall of SecurEnvoy explains why tokens are a thing of the past and that the way forward is for tokenless two-factor authentication using SMS
 
Lone Worker Protection Risk Assessment
Lone Worker Protection and Personal Alarms : 10 March, 2011
Craig Swallow of Connexion2 provides detailed insight into the subject of Lone Worker Protection and explains what constitutes a lone worker and what duties organisations have towards their protection
 
Securing Personal Laptops For Business Use
Data Protection : 07 March, 2011
With the increasing trend of companies providing a stipend to employees to buy their own laptops for both business and personal use, Nick Lowe of Check Point examines the security implications of this cost-saving measure
 
Guide To Achieving PCI DSS Compliance
Software Asset Management and Compliance : 03 March, 2011
David Gibson of Varonis Systems provides a detailed guide to Data Security Standard compliance with the Payment Card Industry
 
Insider Threat Risk Reduction
Data Protection : 17 February, 2011
Sean Glynn of Credant Technologies offers some insight into the theft of commercial information from people inside the organisation and investigates methods that can be used to reduce the threat of insider data theft
 
Managing The Lifecycle Of Firewall Rules
Network Security, Routers and Data Centres : 31 January, 2011
Reuven Harrison of network security specialist company Tufin Technologies examines the tortuous process map for managing change on firewalls and provides advice on simplifying the process and gaining effective management of the rule lifecycle
 
Practical Advice On Building in IP Surveillance Reliability
Camera networks : 26 January, 2011
Nice Systems' product manager Guy Lorman provides some key points on design considerations for ensuring resilience and reliability in modern IP surveillance networks
 
Privileged Identity Management Reduces Insider Threat In Casino and Gaming Industry
Data Protection : 20 January, 2011
Philip Lieberman of Lieberman Software takes a look at the specific IT security requirements of the gaming industry and explains how automated priviliged access and identity management can reduce the risk factors in casinos relating to insider threats
 
Check Point Examines Security Approaches To The Year Ahead
Anti-virus and anti-malware software : 18 January, 2011
Nick Lowe of Check Point peers deeply into the prediction for endpoint and data security trends of 2011 with particular emphasis on emerging threats
 
Automating Encryption Key Management
Internet Security and Content Filtering : 09 December, 2010
Gregory Webb of Venafi explains the dilemma of meeting PCI Data Security Standards whilst managing ever increasing numbers of encryption keys and certificates, a process that can be automated to provide a consistently secure environment
 
Privileged Identity Management In The Cloud
Cloud Computing Security : 08 December, 2010
Phil Lieberman of Lieberman Software examines the way organisations need to approach privileged identity management in cloud computing environments as infrastructures inexorably migrate away from internal systems
 
The Bunker Lifts The Veil On Cloud Computing
Cloud Computing Security : 07 December, 2010
Simon Neal of The Bunker explains why robust security and service level agreements are a necessity when specifying cloud computing environments
 
Remain Compliant During The Implementation Of IT Changes
Software Asset Management and Compliance : 03 December, 2010
Maya Malevich and Michael Hamelin of Tufin Technologies examine the importance of change management in IT implementations and provide a guide on how to perform change successfully without losing control
 
Penetration Testing vs Ethical Hacking
Data Protection : 30 November, 2010
Anthony Haywood of Idappcom explains the flaws in the use of bounty seeking ethical hackers to test your applications rather than application testing at the design stage
 
Considering Human Factors In Vulnerability Assessment
Data Protection : 26 November, 2010
Giri Sivanesen of Pentura discusses the exploitation of people in launching cyber attacks on businesses with advice on how to factor this consideration into overall vulnerability assessment
 
Social Media Risk Mitigation In The Workplace
Internet Security and Content Filtering : 15 November, 2010
Chris Jenkins, the Security Director at Dimension Data, explains the risks associated with the use of social media in the workplace and how this risks can be mitigated
 
Shadow 2 Forensics Tool In The Fight Against Child Exploitation
Computer Forensics and Data Forensics : 11 November, 2010
Voom Technologies explains how the computer forensics tool, Shadow 2, is helping to combat escalating child abuse cases that are taking place in America
 
Human Factors Prevail In Data Loss Incidents
Data Protection : 02 November, 2010
Alexei Lesnykh of DeviceLock puts recent data loss incidents and industry reports into perspective and suggests the human factor is predominant in the prevention of losses in an industry where IT has become consumerised and cyber-criminals are become more focused in their targets
 
Cyber Espionage Prevention Requires Control of the Weakest Link
Data Protection : 02 November, 2010
Giri Sivanesen, a senior security consultant at Pentura, explains how the human factor is the greatest threat to information security and how hackers and cyber criminals are increasingly employing an espionage-style approach to reaching their target information through human weaknesses
 
Computer Users Set To Be Fighting Off Zombies This Halloween
Anti-virus and anti-malware software : 29 October, 2010
Noa Bar Yosef of Imperva warns computer users of a specific Halloween Zombie danger which is far more real than traditional zombie horrors
 
Advice On Building Password Policies To Overcome Improvements In Cracking Techniques
Data Protection : 27 October, 2010
Chris Stoneff of Lieberman Software provides information on remaining a step ahead of password crackers by employing stronger password policy rules and procedures
 
Digital X-Ray Systems Use in Counter Surveillance Operations
X-Ray Detection : 12 October, 2010
Michael Simpson of Gamma TSE provides insight into the use of 3D imaging systems from 3DX-Ray for use in achieving 100% clearance in counter-surveillance sweeps for Government projects
 
Anti-Card Skimming Technology For ATM Systems
Finance and Banking Security : 11 October, 2010
Banking System security specialist surveys existing ATM security technology and provides alternative method of preventing card-skimming
 
Security Budget Spending In Constrained Times
Data Protection : 29 September, 2010
Bob Heard of Credant Technologies analyses how IT security can maintained whilst working within constrained budgets and without compromising data integrity
 
Data Storage Management Challenges
Data Protection : 28 September, 2010
Imperva examines data storage requirements to enable correct levels of access without unnecessary duplication and without compromising security requirements
 
Preventing Data Leakage Through Reducing Employee Mistakes
Data Protection : 16 September, 2010
Nick Lowe of Check Point discusses the loss of data through employee error and suggests ways of applying preventive measures to reduce these instances of non-malicious data loss incidents
 
Avoiding the hidden costs of the mobile workforce
Data Protection : 14 September, 2010
Colin Woodland of IronKey examines data safety and the costs associated with data breaches as the risks become higher with increasing levels of workforce mobility
 
A Step By Step Guide to Firewall Auditing
Network Security, Routers and Data Centres : 14 September, 2010
Michael Hamelin of Tufin Technologies provides guidance on getting through the audit process for ensuring compliance of firewalls
 
Dinosaurs and Tape Based Backup Storage Systems
Exhibitions and Trade Shows : 07 September, 2010
Jon Mills of Sepaton explains how intelligent disk storage systems are higher up the evolutionary ladder than tape storage systems, drawing analogies with the Tyrannosaurus Rex
 
Lone Worker Device Selection Based On BS 8484
Lone Worker Protection and Personal Alarms : 02 September, 2010
Anne de Vere of Connexion2 provides an overview of the BS 8484 Code of Practice and explains its significance in providing duty of care to vulnerable employees when selecting a lone worker protection device
 
Multi-Biometric Kiosks Enable High Passenger Flows At Spanish Airports
Face Recognition : 31 August, 2010
Neurotechnology and Spanish integrator Indra have installed a multi-biometric access control system based on finger print and face biometrics in two of Spain's top airports for verifying the identity of European Union passengers holding biometric passports
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo