Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Special Report
Overcoming Surveillance System Privacy Issues
IP and Megapixel cameras : 25 August, 2010
Iain Cameron of Mirasys discusses public privacy issues surrounding the use of CCTV surveillance in the UK and explains how simple measures such as privacy masking, storage management and independent justification analysis can help in establishing confidence that privacy is being considered during installations
 
Constant Vigilance Needed To Remain Safe Online
Internet Security and Content Filtering : 19 August, 2010
Amit Klein of Trusteer provides useful insight into the world of online threats that are increasingly deploying social engineering tactics to make users drop their guard when they least expect it, exposing sensitive information or diverting to sites containing malware
 
De-Duplication Options For Data Centres
Exhibitions and Trade Shows : 19 August, 2010
Steve Mackey of Quantum explains the technology of De-Duplication of data during back-up operations and answers seven topical questions relating to the use of de-duplication in data centre environments
 
POS Security Standards Go Beyond PIN Protection
Payment cards and e-commerce security : 13 August, 2010
As point-of-sale card transactions continue to grow as the preferred retail payment choice, Steve Brunswick and Jose Diaz of Thales detail the standards that need to be adhered to and what they mean
 
Key Advice On Protecting Virtualised Data
Exhibitions and Trade Shows : 13 August, 2010
Peter Eicher of Syncsort provides five key imperatives to be considered when operating in a virtual environment for the protection of critical data assets
 
The Use Of Distributed IP Surveillance For Securing Major Sports Events
Video Management Systems : 12 August, 2010
Oliver Vellacott of IndigoVision explains the advantages of using a distributed architecture when specifying IP surveillance systems for large scale events such as the Olympic Games
 
Good Rule Housekeeping Improves Firewall Performance
Network Security, Routers and Data Centres : 04 August, 2010
Reuven Harrison of Tufin Technologies provides some guidelines to firewall users on how to clean up the rulebase on their devices and prevent firewall performance from degrading over time
 
Effective, In-House Distributed Data Tokenisation
Data Protection : 22 July, 2010
Ulf Mattsson of Protegrity provides insight into the challenges of data tokenisation and how his company has developed a scalable and distributed approach to tokenisation which overcomes the challenges associated with the more usual centralised methods
 
Holographic Technology Remains At The Fore In Banknote Forgery Protection
Trade Organisations, User Groups and Pressure Groups : 07 July, 2010
The new 1000 Tenge note for Kazakhstan is the latest banknote to use an array of security technology features including the latest holographic technology as explained by Dr Glenn Wood of the International Hologram Manufacturers Association
 
Data Leakage Threats From External Contractors
Data Protection : 07 July, 2010
With recent heavy focus on the insider threat, Nick Burrows of Telindus UK examines the external threat to company data from contracted employees and outsourced staff accessing corporate data
 
Avoiding Corporate Data Loss
Data Protection : 07 July, 2010
Tim Pollard of Credant Technologies examines the ease with which employees can take possession of corporate data and identifies the 20 most common ways that data walks out of the door
 
Key Factors In Choosing the Correct Security Solution
Data Protection : 07 July, 2010
Andy Cordial of Origin Storage examines the factors that need to be considered for choosing the right IT security solution amongst the many that are on offer
 
Fortify Answers the Question: What is Cloud Computing?
Cloud Computing Security : 06 July, 2010
With 25% CAGR forecast for Cloud Computing growth, Mike Armistead of Fortify Software provides fundamental details about the technology, the methods of its adoption and the benefits that can be derived from it
 
Secure Real Time Data Sharing Advantages
Data Protection : 29 June, 2010
Alan Arnold of Vision Solutions describes how real time data sharing across disparate databases in a secure environment can have significant advantages for businesses
 
Nevada Fire Brigade Use CyberLock For On Board Medicine Control
Electronic Locking Systems : 28 June, 2010
Andy Hilverda of Videx explains how a busy fire brigade in the US state of Nevada has grasped flexible control over keys and access to controlled medicines stored on rescue vehicles used in responding to emergencies
 
IDTechEx Examines The State Of The RFID Market
Tracking and EAS : 25 June, 2010
Dr Peter Harrop of IDTechEx provides some guidance on the Global RFID Market and examines some of the factors which are influence the boom in demand that the technology is now going through
 
How to Avoid Becoming the Victim of a Browser Attack
Internet Security and Content Filtering : 21 June, 2010
Guy Guzner of Check Point explains browser attacks, how they operate, why cyber-criminals are increasingly using them and what you can do to prevent them
 
ATM Surveillance Methods Explained
Bullet, miniature and covert cameras : 21 June, 2010
Surveillance equipment manufacturer uses question and answer method of explaining the way that ATM surveillance systems are typically set up to reduce crime and prevent fraud
 
Advanced Persistent Threats and Industrialised Hacking Explained
Internet Security and Content Filtering : 14 June, 2010
Amichai Shulman of Imperva explains the difference between two common hacking methods, Advanced Persistent Threats and Industrial Hacking and the way IT professionals should differentiate their response to each kind of threat
 
Combating the Threat of International Terrorism
X-Ray Detection : 11 June, 2010
Peter Kant, Vice President, Global Government Affairs at Rapiscan Systems describes how both processes and technology are evolving to meet the future demands of screening large numbers of people and vehicles to stem to tide of terrorism internationally
 
Mitigation of Data Loss On Stolen Laptops
Data Protection : 09 June, 2010
With laptop theft reaching as much as 10%, the risk of losing more than just the equipment is extremely high unless certain measures are taken to reduce the impact of losing hardware, as explained by Belinda Sproston of Check Point
 
IronKey Highlights The Business Benefits Resulting From Increased ICO Powers
Data Protection : 04 June, 2010
Dave Tripier of IronKey explains how the Information Commissioner's Office may have given British industry the best business case in years to nail down its IT processes, data access, storage and information protection
 
Privacy Overhaul Required On Facebook
Internet Security and Content Filtering : 02 June, 2010
Amichai Shulman and Rob Rachwald of Imperva provide a vision of privacy management that they believe is the correct model for Facebook to follow to enable users to have full control over privacy management on the social networking site
 
ISF Comments On Converged IP Security Networks Threat Profile Increase
Network Security, Routers and Data Centres : 02 June, 2010
The ISF has commented on the risks associated with building security systems on IP networks, exposing converged access control and surveillance networks to malicious attacks and the risk of mis-configuration due to complexity
 
A Guide to Network Interruption Recovery
Network Security, Routers and Data Centres : 24 May, 2010
Reuven Harrion of Tufin Technologies explains the secrets of surviving and recovering from Network Interruptions
 
The Choice Between Managing Internet Access And Blocking It
Internet Security and Content Filtering : 20 May, 2010
Rob Swainson, Managing Director of Blue Cube discusses the use of social networking in the workplace and provides some insight into making the decision whether to embrace change and manage access or block access to new media tools
 
UK Electoral Commission Information Access Security
Data Protection : 19 May, 2010
Guy Churchward of LogLogic questions whether the UK Electoral Commission has sufficient control over privileged user rights for accessing voter registers
 
The Importance of Enterprise Information Availability
Backup, Data Recovery and Disaster Recovery : 12 May, 2010
Alan Arnold of Vision Solutions explains the power of information availability and the recovery of business value from unprofitable downtime
 
Businesses Adapt To New Challenges By Adopting New Approaches in IT
Cloud Computing Security : 10 May, 2010
Paul Evans of Redstor explains the business imperative of making use of changing approaches in IT technology in order to maintain regulatory compliance and adapt to changing requirements
 
Public Sector Adoption Of Cloud Computing
Cloud Computing Security : 07 May, 2010
Steve Smith, Managing Director of Pentura, examines the problems and benefits of cloud computing adoption by the public sector from the point of view of risk management
 
Deploying Intelligent Outdoor Surveillance Systems To Reduce Nuisance Alarms
Analogue and HD Cameras : 29 April, 2010
John Romanowich of SightLogix explains the problem of false alarms with outdoor sensors and how intelligent surveillance systems can hep to overcome the problem
 
The True Financial Impact Of IT System Downtime
Backup, Data Recovery and Disaster Recovery : 22 April, 2010
When considering the need for protection of data and IT systems within commercial organisations, a good understanding of the true financial impact of downtime is essential, as explained by Alan Arnold of Vision Solutions in his special report
 
Recruitment Consultancy Advice For Information Security Work Candidates
Exhibitions and Trade Shows : 01 April, 2010
Scott West of Acumin Consulting provides advice for job-seekers in the Information Security industry stating that a good CV, good communication skills and enthusiasm are essential ingredients
 
What are HTTPS Proxies?
Exhibitions and Trade Shows : 30 March, 2010
Felix Blank of GateProtect explains how the use of HTTPS proxies closes the final loophole on virus infection and could be the last bastion in the war against malware
 
SaaS Vendor Negotiating Checklist
Data Protection : 24 March, 2010
Barmak Meftah of Fortify Software provides some advice on selection processes for choosing SaaS vendors with a checklist of facts and questions to ask prospective suppliers
 
Lone Worker Protection and Meeting Duty of Care Responsibilities
Lone Worker Protection and Personal Alarms : 23 March, 2010
Tom Morton of Argyll explains the role of lone worker protection systems in mitigating risks of health and safety at work legislation contravention and the associated consequences
 
Evolving Security To Stay Ahead of The Hackers As The Rules Of The Game Keep Changing
Internet Security and Content Filtering : 23 March, 2010
Bill Roth of LogLogic provides his thoughts on the Kneber Bot which has proven that large scale hacking continues to be a significant threat which proves that signature based threat detection falls a long way short of being adequate security
 
Specification Considerations For Outdoor Surveillance Systems
IP and Megapixel cameras : 22 March, 2010
Phil Doyle, Axis Communications' UK and Ireland Managing Director provides some insight into how to specify outdoor surveillance systems to ensure resilient security in harsh conditions with a wide spectrum of variables
 
Credant TechnologiesÃÂÃâ€ÂÃâ€Â GOAT - or Glossary of Acronyms And Terminology
Data Protection : 16 March, 2010
Sean Glynn of Credant Technologies sets out to cut through the IT Security Industry's jargon and explain what some of those acronyms really mean in the geek dictionary
 
Managing Mobile Data To Prevent Escalating Data Losses
Exhibitions and Trade Shows : 10 March, 2010
Andy Baldin of LANDesk Software explains the rise in data loss due to increased data portability and suggests ways of containing the problem
 
Reducing Human Factors in IT Security
Exhibitions and Trade Shows : 09 March, 2010
Martyn Smith of Logically Secure contemplates the difference between errors and mistakes and believes that better end user education can reduce the number of errors that expose security vulnerabilities
 
Applying Good Back-Up Strategies to Mobile Data Devices
Backup, Data Recovery and Disaster Recovery : 09 March, 2010
Andy Cordial, Managing Director of Origin Storage explains the backup risks associated with removable memory devices and how organisations can ensure that good back-up regimes are operated regardless of the memory technology used
 
Social Networking Business Risks and How to Handle Them
Exhibitions and Trade Shows : 05 March, 2010
Simon Morris of Pentura looks at the risks which social networking brings to businesses and provides some advice on how to manage them
 
A Guide to Risk Identification, Assessment and Remediation
Exhibitions and Trade Shows : 05 March, 2010
Alan Bentley of Lumension Security reviews IT risk management and demonstrates the need for repeatable processes to identify, assess and remediate risks in order to protect business data
 
What is Information Assurance?
Exhibitions and Trade Shows : 04 March, 2010
Martyn Smith of Logically Secure explains information assurance and how to ensure that it is correctly implemented
 
A Review Of Data Breaches and What Can Be Done
Exhibitions and Trade Shows : 03 March, 2010
Martyn Smith of Logically Secure examines data breaches in both the public and private sector with further information on how such lapses which lead to private information being compromised can be prevented
 
How Do You Recover From Being Hacked?
Data Protection : 01 March, 2010
Hacking recovery depends on a number of factors as explained by Giri Sivanesan of Pentura who offers advice on what to do after discovering you've become a victim to a hacking incident
 
Adopting a BurglarÃÂÃâ€ÂÃâ€Âs Way of Thinking
Security in the Home : 26 February, 2010
With crime figures up in the UK for 2009, EyeSpy 247 provides some insight into the burglar's point of view and provides some advice on how to avoid falling victim
 
How do you Justify IT Security Expenditure
Data Protection : 25 February, 2010
Providing justification for purchasing IT security solutions is a challenge which Ben Ross of Becrypt resolves with Key Performance Indicators and Productivity Gains
 
IT Service Delivery Changes Resulting from the Cloud
Data Protection : 23 February, 2010
Mark Shavlik of Shavlik Technologies looks at the impetus for adopting cloud based IT services and examines the roles played by the IT department in implementing cloud solutions in the enterprise
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com