Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Special Report
The evolution of technology platforms – what does this mean for businesses?
Network Security, Routers and Data Centres : 16 April, 2014
Wieland Alge, VP and general manager for EMEA, Barracuda Networks examines the evolution of technology to the "3rd platform"
Secure offline access to mobile devices
Mobile computing security : 04 April, 2014
Mobile Helix explains the risks associated with offline access on mobile devices and how vulnerabilities can be reduced
Securing big data from the latest threats
Data Protection : 03 April, 2014
Jonathan Lewis of SSH Communications Security examines the growth in big data and the implications for ensuring security
Vulnerabilities in a brave new world of the internet of things
SCADA and ICS protection : 07 March, 2014
Richard Moulds, VP Strategy at Thales e-Security examines the internet of things, how it affects peoples' daily lives and the vulnerabilities that it introduces
Securing the future with multi-factor authentication
Authentication : 17 February, 2014
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
The dangers of the commute for sensitive data
Data encryption : 14 January, 2014
Iron Mountain's head of Information Risk, Christian Toon, discusses the vulnerability of sensitive company data during the daily commute of company employees
Today’s Core Network Security Requires a New Approach to Prevent against Destructive SQL Attacks
Data Protection : 20 December, 2013
Michael Sabo, VP of Marketing at DB Networks explains the continued prominence of SQL injection attacks and the approaches needed for their prevention
Combatting Cyber-Attacks Takes more than Incident Detection
Network Security, Routers and Data Centres : 06 December, 2013
Mike Horn of NetCitadel examines new approach to cyber threat management connecting threat detection to appropriate and timely responses
Free file sanitization from the cloud
Anti-virus and anti-malware software : 03 December, 2013
Free cloud based sanitization service from Votiro enables users to upload suspicious files to the cloud for analysis
Two factor authentication for online identity management
Authentication : 02 December, 2013
SecurEnvoy explains how to reduce the risk of unauthorized data access using a variety of two-factor authentication that doesn't rely on seed records being held by the authentication company
Is there such a thing as a silver bullet for web application security?
Internet Security and Content Filtering : 29 November, 2013
Jerome Clauzade of Bee Ware examines web application security and an effective structure for implementing it using a combined resource approach
Online retail security best practice
Data encryption : 11 November, 2013
Dave Anderson of Voltage Security explains best practices for online retailers to ensure high levels of security
Protecting identity when working remotely
Authentication : 08 November, 2013
SecurEnvoy's Steve Watts explains the variants of two-factor authentication and how companies can prevent their data from being accessed
The Last Rites of Traditional IT Security
Data Protection : 24 October, 2013
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threats for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date
Non-human identity management in process automation
Identity Management : 21 October, 2013
Jonathan Lewis of SSH Communications Security discusses the role of Secure Shell for the authentication of non-human identities in M2M networks
Your CMS is the path of least resistance for industrial hackers
Data Protection : 09 October, 2013
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
Planning outdoor event security
Video Analytics and ANPR : 25 September, 2013
Ian Graham, SVP & GM Video EMEA at Verint looks back on this year's outdoor event season and takes a look at the lessons to be learnt for securing them
Balancing staff acquisition with IT security requirements
Data Protection : 24 September, 2013
Raj Samani of McAfee explains the steps needed to secure information assets in small businesses from insider threats when recruiting new staff
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Data Protection : 20 September, 2013
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Web safety needs training as well as technology
Training courses, Seminars and Conferences : 16 September, 2013
Bill Walker of QA comments on the recent MP porn scandal and discusses the need for appropriate training in web safety as well as the technology of web filtering
Small organizations just as vulnerable as corporates
Data Protection : 06 September, 2013
Check Point discusses the significance of company size relating to the need for strong IT security and concludes that smaller companies are just as vulnerable
Hybrid analogue and IP surveillance network benefits
IP and Megapixel cameras : 02 September, 2013
Samsung Techwin provides insight into the benefits to be gained from using IP surveillance cameras with analogue outputs on hybrid camera networks
Mobile forensics vital in finding honour killing victim
Computer Forensics and Data Forensics : 28 August, 2013
Cellebrite explains the important role of forensic investigations of mobile devices in finding the body of honour killing victim, Banaz Mahmod
Understanding risk in virtualized environments
Cloud Computing Security : 16 August, 2013
Frederik Bijlsma of Red Hat explores virtualization and how reducing uncertainty and understanding exposures can bring about improvements in risk management
Secure Shell Key Management and Retrieval Guide
Data Protection : 13 August, 2013
Jason Thompson, global director of marketing for SSH Communications Security explores secure shell key management and asks who it is who has the keys to your server
Biometric time and attendance for the construction industry
Fingerprint recognition : 05 August, 2013
Simeio's Ollie McGovern explains how combining biometrics, cloud technology and time and attendance can benefit the construction industry
Ten tips on mitigating information risk
Data Protection : 02 July, 2013
Marc Duale, President International at Iron Mountain shares some of the lessons learnt by companies and passed on to others on protecting company information
Standard of due care for Public Key Infrastructure
Data Protection : 19 June, 2013
Richard Moulds, VP Strategy of Thales e-Security examines the use of keys in PKI and identifies ten standards of due care
How Secure Shell Key Mismanagement Puts Your Data at Risk
Software Asset Management and Compliance : 03 June, 2013
Tatu Ylönen, CEO and founder, SSH Communications Security examines the risks associated with the mismanagement of secure shell keys
Factoring security into cloud architectures
Cloud Computing Security : 29 May, 2013
James Carnie, the head of solutions architecture at Adapt provides insight into achieving the right balance between flexibility and security in the cloud
Protection of high value intellectual property
Data Protection : 25 April, 2013
On world intellectual property day, Christian Toon of Iron Mountain examines the value of trade secrets and why their protection must be prioritised
Does a breach seemingly every other day keep the cloud away?
Cloud Computing Security : 15 March, 2013
Mark Knight, Director of Product Management at Thales e-security examines the link between effective BYOD policies and the security of data in the cloud
Retrospective network analysis provides key to APT detection
Network Security, Routers and Data Centres : 04 February, 2013
Sourcefire tackles advanced persistent threats with retrospective inspection of code on networks
Explosive growth in Android malware
Mobile computing security : 14 January, 2013
Ninety-nine percent of smartphone malware discovered during 2012 targeted the popular Android platform
ISO Authentication standard brings benefits to hologram industry
Trade Organisations, User Groups and Pressure Groups : 05 November, 2012
Ian Lancaster of the International Hologram Manufacturers Association (IHMA) explains the relevance of the ISO 12931 authentication standard to the hologram industry
Managing The Social Impact of Least Privilege Security
Data Protection : 15 October, 2012
Paul Kenyon, COO of Avecto explains how desktop lockdown doesn’t mean taking the personal out of PC
ISACA Speculates On the Next Trend Beyond BYOD
Trade Organisations, User Groups and Pressure Groups : 10 September, 2012
Christos Dimitriadis of ISACA looks into the background of BYOD (Bring Your Own Device) and uses it to foretell the future of network security and predict what will BYOD V2 be
The Role of Governance in Identity and Access Management
Trade Organisations, User Groups and Pressure Groups : 30 August, 2012
Mike Small of ISACA explains the approach of good governance in its role as a binding factor in controlling access and managing identity
Securing Against The Evolution of Malware
Anti-virus and anti-malware software : 29 August, 2012
Jamie Bodley-Scott of Cryptzone examines the growth of malware since the birth of the PC and what organisations need to do to meet the changing face of security protection
Cloud Computing And The Dangers Of A Slothful Approach
Trade Organisations, User Groups and Pressure Groups : 29 August, 2012
Being sluggish in comprehending the cloud computing environment that a business is adopting can lead to problems as explained by Mike Small of ISACA
Ten Reasons For Reducing Privileged Access
Data Protection : 15 August, 2012
Paul Kenyon of Avecto provides ten good reasons why every organisation should implement a policy of user privileges that minimises risk
IPV6 Effects on Firewall Management
Network Security, Routers and Data Centres : 11 July, 2012
Reuven Harrison of Tufin Technologies provides insight into the transition to IPv6 and what this will mean for firewall management
Holographic Protection of Intellectual Property
Trade Organisations, User Groups and Pressure Groups : 26 January, 2012
Glenn Wood of the International Hologram Manufacturers Association provides details about the protection of intellectual property rights and the role that holography plays in this increasingly prominent role
Handheld Markets Features Highly In Security Predictions for 2012
Data Protection : 23 November, 2011
Andy Kemshall of SecurEnvoy predicts the IT security landscape for 2012 with the handheld market at the top of his list
Privileged Access In Corporate Windows Environments
Data Protection : 07 November, 2011
Avecto's COO, Paul Kenyon shares his view through corporate windows and explains how admin accounts on the popular platform can lead to problems
Best Practice IT Security Policy Management
Data Protection : 14 October, 2011
Dominic Saunders of Cryptzone provides the six steps needed to achieve IT security policy excellence for balancing the mitigation of risk with commercial requirements
Identity Verification Fundamental To Securing IT Resources
Data Protection : 21 September, 2011
Andy Kemshall of SecurEnvoy discusses the use of common sense as a significant factor in the overall IT security operations of an organisation
Intelligent Surveillance In The Prevention Of Retail Crime
IP and Megapixel cameras : 16 September, 2011
Quadrox provides information on how modern High Definition CCTV surveillance systems provide more than a watching eye in the retail industry and can make a significant contribution towards reducing retail shrinkage
Defeating Denial Of Service Attacks
Anti-virus and anti-malware software : 05 September, 2011
Imperva Product Manager examines DDos Attacks and looks at how they can be defeated
Trusteer Dispels The Myths Around Mobile Malware
Mobile computing security : 16 August, 2011
Amit Klein of Trusteer explains why malware delivered to mobile devices should be taken seriously because the market is now ripe for cyber-criminals to exploit
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012