Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Special Report
Tackling Today’s Authentication Complexities
Authentication : 07 April, 2015
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
 
IT security company evolution
Anti-virus and anti-malware software : 02 April, 2015
Kirill Slavin, General Manager, Kaspersky Lab UK and Ireland, explains Why diversify or die doesn’t always ring true in an ever-evolving IT security market place
 
Increase in cyber attacks affects all sizes of companies
Data Protection : 01 April, 2015
Darren Anstee, Director of Solutions Architects at Arbor Networks puts perspective on the cyber security landscape and shows it isn't just large companies that are at risk
 
Matching security to increased network performance
Network Security, Routers and Data Centres : 26 March, 2015
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems
 
Three key IT security focus areas identified
Data Protection : 19 March, 2015
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
 
Key actions needed to ensure digital safety
Data Protection : 10 March, 2015
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe
 
The most dangerous IT threats of the year and how to neutralise them
Network Security, Routers and Data Centres : 02 March, 2015
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
 
Preventable software failures plagued 2014
Data Protection : 25 February, 2015
SQS reviews 2014 with a list of the top software failures of the year and their impact, including the infamous Heartbleed bug
 
Mobile data provides essential information in litigation cases
Computer Forensics and Data Forensics : 25 February, 2015
Yuval Ben-Moshe, senior director of forensic technologies at Cellebrite explains why civil litigators who do not consider collecting mobile data risk missing crucial information
 
Host service provider strategies to defend against DDoS attacks
Anti-virus and anti-malware software : 25 February, 2015
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
 
Lessons learned from web mobile application vulnerabilities
Data Protection : 23 February, 2015
Adrian Beck of Veracode looks back at some of the main data breach incidents of 2014 and explains what could be done to prevent them
 
Eight reasons to deploy multi-factor authentication
Authentication : 19 February, 2015
David Hald of SMS Passcode provide compelling reasons why Multi-Factor Authentication should be implemented for greater security
 
Five steps to secure iterative software delivery
Data Protection : 18 February, 2015
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
 
Defending company assets against the latest onslaught of cyber attacks
Data Protection : 18 February, 2015
Kalyan Kumar of HCL Technologies looks at the best defence strategies that organisations can use to protect themselves from increasingly sophisticated and effective cyber threats
 
Securing digital identities amongst the Internet of Everything
Data Protection : 11 February, 2015
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics
 
Stepping up to the changing demands in airport security
Manned Guarding : 02 February, 2015
Securitas specialist, Mark Allen, explains how the company is stepping up to the increasing needs of aviation security needs
 
Beyond access control with next-generation NAC
Network Security, Routers and Data Centres : 02 February, 2015
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications
 
To stay safe from cybercrime small firms need to stop thinking like consumers
Anti-virus and anti-malware software : 12 January, 2015
Kaspersky Lab examines the cyber security dilemma of smaller companies and shows how they need to start emulating larger firms in their approach to data security
 
Learning lessons from 2014 threats for a secure new year
Internet Security and Content Filtering : 08 January, 2015
2015, when companies will realise they aren’t 100% secure, and consumers will begin to take care of their own security business
 
Enterprise security will become a business challenge in 2015
Data Protection : 08 January, 2015
Rob Lay, Solutions Architect for Enterprise and Cyber Security in UK & Ireland at Fujitsu explains the growing challenges associated with enterprise security
 
Reducing Cyber Risk with Trustworthy Best Practices
Data Protection : 08 January, 2015
Ed Paradise, Vice President of Engineering at Cisco explains industry best practice for cyber risk reduction
 
Lessons learned from 2014, the year of the breach
Anti-virus and anti-malware software : 05 January, 2015
Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked.
 
Lessons learned from 2014 – The year of the breach
Anti-virus and anti-malware software : 18 December, 2014
Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked.
 
From fiction to reality: tackling the cyber threats of tomorrow
Anti-virus and anti-malware software : 15 December, 2014
Kirill Slavin, general manager at Kaspersky Lab UK&I examines the future of IT security and the rise in significance of the internet of things
 
SMS based 2FA overcomes password laziness
Authentication : 04 December, 2014
Silvio Kutic, CEO at Infobip examines the problem of a lazy approach to password security and explains how SMS based two-factor authentication could be the answer
 
The EU cyber taskforce should only be the beginning
Data Protection : 19 November, 2014
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals
 
Corporate data security trust restoration
Data Protection : 14 November, 2014
Paul Hampton, Payment & Crypto management expert at SafeNet explains the four steps required to restore trust in corporate data security
 
Use the Power of the Pyramid to Protect Critical Data
Data Protection : 13 November, 2014
Steve Martino, Chief Information Security Officer, Vice President, Information Security at Cisco explains the prioritization requirements of data protection
 
Office worker survey shows high levels of complacency over data loss
Data Protection : 12 November, 2014
Imation has performed a study into company employee views on data risk and the vulnerability of confidential data in the hands of remote workers
 
Avoiding the pitfalls of authentication based IT security
Authentication : 10 November, 2014
David Hald, co-founder and chief relation officer, SMS PASSCODE provides a step-by-step guide to understanding the common pitfalls of authentication-based security
 
Safe at Any Speed - Best Practices for the Era of 100G
Network Security, Routers and Data Centres : 27 October, 2014
Dan Joe Barry, vice president of marketing at Napatech, explains the best practices in providing protection for the latest generation of high speed networks
 
Measuring success in threat management programmes
Data Protection : 16 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
 
UK law governing protection of lone workers
Lone Worker Protection and Personal Alarms : 16 October, 2014
Mathew Colley of LoneALERT examines the need for UK companies to ensure they have protection in place for employees who work alone
 
Creating an IT Metrics programme to Safeguard the Network
Data Protection : 14 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco Systems explain the importance of setting up a unified IT security metrics programme
 
Nine DDoS Assumptions That Must Be Put to Bed
Anti-virus and anti-malware software : 04 September, 2014
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks
 
Corporate data risks through mixing personal and business applications on one device
Data Protection : 31 July, 2014
Florian Malecki, international product and marketing director, Dell Security examines the corporate security problems associated with the BYOD culture
 
Safe mobile connectivity in an age of industrialized hacking
Mobile computing security : 22 July, 2014
Cisco Security Strategist, Sean Newman, discusses the increased use of employee-owned devices and how to stay safe during a corresponding increase in mobile malware
 
Profile G of open video standard released
Books, magazines, journals, analysis and reports : 08 July, 2014
Open network video standard organisation, ONVIF, has released Profile G to cater for storage, search and retrieval capabilities
 
E-mail spam reaches almost 70% during May
Internet Security and Content Filtering : 08 July, 2014
May saw a small reduction in e-mail spam with mass educational mailings offering distance learning being predominant
 
Reducing Risk With Effective Encryption Management
Data encryption : 02 July, 2014
Jason Thompson, Director of Global Marketing at SSH Communications Security discusses the role of encryption management in risk reduction
 
Securing Third-Party Access of IT Systems in the Public Sector
Authentication : 02 July, 2014
Matt Middleton-Leal, Regional Director, UK and Ireland at CyberArk discussing the security challenge surrounding the emerging trend of smaller companies gaining privileged access to Government IT resources
 
An Intelligent Approach to Fighting Cyber Attacks
Data Protection : 19 June, 2014
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime
 
Operating in zero trust environments
Network Security, Routers and Data Centres : 30 May, 2014
Dr Wieland Alge, Vice President and General Manager EMEA Barracuda Networks discusses zero trust environment infrastructures and the role of the CIO
 
Heartbleed protection best practices
Data encryption : 22 May, 2014
Kalle Jääskeläinen of SSH Communications Security explains the seriousness of the consequences of Heartbleed and best practices for protecting against them
 
The information time bomb at the heart of M&As
Data Protection : 19 May, 2014
Charlotte Marshall, Managing Director of Iron Mountain in the UK, Ireland and Norway examines the need for integrated information security during mergers and acquisitions
 
Re-Thinking the Approach to Real-Time Network Security
Network Security, Routers and Data Centres : 30 April, 2014
Dan Joe Barry, vice president of marketing at Napatech explains how multiple attack vectors are causing a change of approach to securing networks in real time
 
Turning the tides against cybercrime
Data Protection : 30 April, 2014
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime
 
Designing security into the cities of the future
Installers, Integrators and Consultants : 28 April, 2014
Frederic Dot, Global Industry Development Director, Dassault Systemes, looks at the effects of digitally modelling cities to improve efficiency, security and public services
 
Retail industry suffers rise in cyber crime
Data Protection : 25 April, 2014
David Robinson, chief security officer at Fujitsu UK & Ireland discusses the recent rise in cyber-crime in the retail industry
 
The evolution of technology platforms – what does this mean for businesses?
Network Security, Routers and Data Centres : 16 April, 2014
Wieland Alge, VP and general manager for EMEA, Barracuda Networks examines the evolution of technology to the "3rd platform"
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo