Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Special Report
Safe mobile connectivity in an age of industrialized hacking
Mobile computing security : 22 July, 2014
Cisco Security Strategist, Sean Newman, discusses the increased use of employee-owned devices and how to stay safe during a corresponding increase in mobile malware
 
Profile G of open video standard released
Books, magazines, journals, analysis and reports : 08 July, 2014
Open network video standard organisation, ONVIF, has released Profile G to cater for storage, search and retrieval capabilities
 
E-mail spam reaches almost 70% during May
Internet Security and Content Filtering : 08 July, 2014
May saw a small reduction in e-mail spam with mass educational mailings offering distance learning being predominant
 
Reducing Risk With Effective Encryption Management
Data encryption : 02 July, 2014
Jason Thompson, Director of Global Marketing at SSH Communications Security discusses the role of encryption management in risk reduction
 
Securing Third-Party Access of IT Systems in the Public Sector
Authentication : 02 July, 2014
Matt Middleton-Leal, Regional Director, UK and Ireland at CyberArk discussing the security challenge surrounding the emerging trend of smaller companies gaining privileged access to Government IT resources
 
An Intelligent Approach to Fighting Cyber Attacks
Data Protection : 19 June, 2014
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime
 
Operating in zero trust environments
Network Security, Routers and Data Centres : 30 May, 2014
Dr Wieland Alge, Vice President and General Manager EMEA Barracuda Networks discusses zero trust environment infrastructures and the role of the CIO
 
Heartbleed protection best practices
Data encryption : 22 May, 2014
Kalle Jääskeläinen of SSH Communications Security explains the seriousness of the consequences of Heartbleed and best practices for protecting against them
 
The information time bomb at the heart of M&As
Data Protection : 19 May, 2014
Charlotte Marshall, Managing Director of Iron Mountain in the UK, Ireland and Norway examines the need for integrated information security during mergers and acquisitions
 
Re-Thinking the Approach to Real-Time Network Security
Network Security, Routers and Data Centres : 30 April, 2014
Dan Joe Barry, vice president of marketing at Napatech explains how multiple attack vectors are causing a change of approach to securing networks in real time
 
Turning the tides against cybercrime
Data Protection : 30 April, 2014
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime
 
Designing security into the cities of the future
Installers, Integrators and Consultants : 28 April, 2014
Frederic Dot, Global Industry Development Director, Dassault Systemes, looks at the effects of digitally modelling cities to improve efficiency, security and public services
 
Retail industry suffers rise in cyber crime
Data Protection : 25 April, 2014
David Robinson, chief security officer at Fujitsu UK & Ireland discusses the recent rise in cyber-crime in the retail industry
 
The evolution of technology platforms – what does this mean for businesses?
Network Security, Routers and Data Centres : 16 April, 2014
Wieland Alge, VP and general manager for EMEA, Barracuda Networks examines the evolution of technology to the "3rd platform"
 
Secure offline access to mobile devices
Mobile computing security : 04 April, 2014
Mobile Helix explains the risks associated with offline access on mobile devices and how vulnerabilities can be reduced
 
Securing big data from the latest threats
Data Protection : 03 April, 2014
Jonathan Lewis of SSH Communications Security examines the growth in big data and the implications for ensuring security
 
Vulnerabilities in a brave new world of the internet of things
SCADA and ICS protection : 07 March, 2014
Richard Moulds, VP Strategy at Thales e-Security examines the internet of things, how it affects peoples' daily lives and the vulnerabilities that it introduces
 
Securing the future with multi-factor authentication
Authentication : 17 February, 2014
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
 
The dangers of the commute for sensitive data
Data encryption : 14 January, 2014
Iron Mountain's head of Information Risk, Christian Toon, discusses the vulnerability of sensitive company data during the daily commute of company employees
 
Today’s Core Network Security Requires a New Approach to Prevent against Destructive SQL Attacks
Data Protection : 20 December, 2013
Michael Sabo, VP of Marketing at DB Networks explains the continued prominence of SQL injection attacks and the approaches needed for their prevention
 
Combatting Cyber-Attacks Takes more than Incident Detection
Network Security, Routers and Data Centres : 06 December, 2013
Mike Horn of NetCitadel examines new approach to cyber threat management connecting threat detection to appropriate and timely responses
 
Free file sanitization from the cloud
Anti-virus and anti-malware software : 03 December, 2013
Free cloud based sanitization service from Votiro enables users to upload suspicious files to the cloud for analysis
 
Two factor authentication for online identity management
Authentication : 02 December, 2013
SecurEnvoy explains how to reduce the risk of unauthorized data access using a variety of two-factor authentication that doesn't rely on seed records being held by the authentication company
 
Is there such a thing as a silver bullet for web application security?
Internet Security and Content Filtering : 29 November, 2013
Jerome Clauzade of Bee Ware examines web application security and an effective structure for implementing it using a combined resource approach
 
Online retail security best practice
Data encryption : 11 November, 2013
Dave Anderson of Voltage Security explains best practices for online retailers to ensure high levels of security
 
Protecting identity when working remotely
Authentication : 08 November, 2013
SecurEnvoy's Steve Watts explains the variants of two-factor authentication and how companies can prevent their data from being accessed
 
The Last Rites of Traditional IT Security
Data Protection : 24 October, 2013
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threats for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date
 
Non-human identity management in process automation
Identity Management : 21 October, 2013
Jonathan Lewis of SSH Communications Security discusses the role of Secure Shell for the authentication of non-human identities in M2M networks
 
Your CMS is the path of least resistance for industrial hackers
Data Protection : 09 October, 2013
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
 
Planning outdoor event security
Video Analytics and ANPR : 25 September, 2013
Ian Graham, SVP & GM Video EMEA at Verint looks back on this year's outdoor event season and takes a look at the lessons to be learnt for securing them
 
Balancing staff acquisition with IT security requirements
Data Protection : 24 September, 2013
Raj Samani of McAfee explains the steps needed to secure information assets in small businesses from insider threats when recruiting new staff
 
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Data Protection : 20 September, 2013
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
 
Web safety needs training as well as technology
Training courses, Seminars and Conferences : 16 September, 2013
Bill Walker of QA comments on the recent MP porn scandal and discusses the need for appropriate training in web safety as well as the technology of web filtering
 
Small organizations just as vulnerable as corporates
Data Protection : 06 September, 2013
Check Point discusses the significance of company size relating to the need for strong IT security and concludes that smaller companies are just as vulnerable
 
Hybrid analogue and IP surveillance network benefits
IP and Megapixel cameras : 02 September, 2013
Samsung Techwin provides insight into the benefits to be gained from using IP surveillance cameras with analogue outputs on hybrid camera networks
 
Mobile forensics vital in finding honour killing victim
Computer Forensics and Data Forensics : 28 August, 2013
Cellebrite explains the important role of forensic investigations of mobile devices in finding the body of honour killing victim, Banaz Mahmod
 
Understanding risk in virtualized environments
Cloud Computing Security : 16 August, 2013
Frederik Bijlsma of Red Hat explores virtualization and how reducing uncertainty and understanding exposures can bring about improvements in risk management
 
Secure Shell Key Management and Retrieval Guide
Data Protection : 13 August, 2013
Jason Thompson, global director of marketing for SSH Communications Security explores secure shell key management and asks who it is who has the keys to your server
 
Biometric time and attendance for the construction industry
Fingerprint recognition : 05 August, 2013
Simeio's Ollie McGovern explains how combining biometrics, cloud technology and time and attendance can benefit the construction industry
 
Ten tips on mitigating information risk
Data Protection : 02 July, 2013
Marc Duale, President International at Iron Mountain shares some of the lessons learnt by companies and passed on to others on protecting company information
 
Standard of due care for Public Key Infrastructure
Data Protection : 19 June, 2013
Richard Moulds, VP Strategy of Thales e-Security examines the use of keys in PKI and identifies ten standards of due care
 
How Secure Shell Key Mismanagement Puts Your Data at Risk
Software Asset Management and Compliance : 03 June, 2013
Tatu Ylönen, CEO and founder, SSH Communications Security examines the risks associated with the mismanagement of secure shell keys
 
Factoring security into cloud architectures
Cloud Computing Security : 29 May, 2013
James Carnie, the head of solutions architecture at Adapt provides insight into achieving the right balance between flexibility and security in the cloud
 
Protection of high value intellectual property
Data Protection : 25 April, 2013
On world intellectual property day, Christian Toon of Iron Mountain examines the value of trade secrets and why their protection must be prioritised
 
Does a breach seemingly every other day keep the cloud away?
Cloud Computing Security : 15 March, 2013
Mark Knight, Director of Product Management at Thales e-security examines the link between effective BYOD policies and the security of data in the cloud
 
Retrospective network analysis provides key to APT detection
Network Security, Routers and Data Centres : 04 February, 2013
Sourcefire tackles advanced persistent threats with retrospective inspection of code on networks
 
Explosive growth in Android malware
Mobile computing security : 14 January, 2013
Ninety-nine percent of smartphone malware discovered during 2012 targeted the popular Android platform
 
ISO Authentication standard brings benefits to hologram industry
Trade Organisations, User Groups and Pressure Groups : 05 November, 2012
Ian Lancaster of the International Hologram Manufacturers Association (IHMA) explains the relevance of the ISO 12931 authentication standard to the hologram industry
 
Managing The Social Impact of Least Privilege Security
Data Protection : 15 October, 2012
Paul Kenyon, COO of Avecto explains how desktop lockdown doesn’t mean taking the personal out of PC
 
ISACA Speculates On the Next Trend Beyond BYOD
Trade Organisations, User Groups and Pressure Groups : 10 September, 2012
Christos Dimitriadis of ISACA looks into the background of BYOD (Bring Your Own Device) and uses it to foretell the future of network security and predict what will BYOD V2 be
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com