Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
Risk Management
All businesses face risks and the effective management of these risks is fundamental to continued operations when faced by threats. Risk management encompasses the identification, assessment and mitigation of risks that a business may face. Part of the risks that businesses face are mitigated to some extent through regulation with which companies are obliged to comply. Regulatory compliance, risk management and the ability for management processes to meet functional requirements are broadly covered by the subject of Governance, Risk and Compliance (GRC)
Transition laundering detection for banks and e-commerce
Banks, payment processing companies and others can now benefit from a merchant risk management service to prevent transition laundering
MSc qualification available in security
Security professionals are now able to get a higher qualification through an MSc programme in International Security and Risk Management
Mid-year update on secure identity trends
HID Global shares its insight into the trends that are dominating the secure identity segment
Protective tools respond to changing terrorism threats
Avon Protection is supplying a range of services and equipment from respiratory protective systems to thermal imaging cameras in response to changing threats
Cloud based endpoint privileged account security
Viewfinity provides cloud based integrated privileged access management with application control without user experience compromise
Security company opens training and consultancy arm
Axis Security has created a training company which will offer coaching to the industry with consultancy in the UK
Integrated IT security aids Turkish Credit Bureau
ForeScout Technologies chosen by KKB Credit Bureau in Turkey for providing the platform to secure the network and integrate security systems.
Cyber essentials certification for Intel Security
Intel Security gains UK Government certification against its Cyber Essentials Scheme
Courses available on security standard implementation
Two courses have been introduced for the implementation of the ISO 27001 security standard by Skills for Security
Channel Reseller News recognition for ForeScout CEO
Mike DeCesare named in top 100 executive list in Channel Reseller News rankings for 2015
Security breach impact on virtual infrastructure
Report shows companies running virtual infrastructures suffer higher costs resulting from security breaches
Malware attacks target public sector
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
Security association members to speak at UK event
Experts from BSIA member organisations will be making scheduled appearances as part of the conference programme taking place at IFSEC this week in London
Considerations for taking out cyber insurance
Charles Sweeney, CEO of Bloxx, examines the case for commercial cyber liability insurance and what steps companies can take to reduce risk and premiums
Security partnerships improve threat response capabilities
Parnership expansions based on ForeScout ControlFabric bolster mitigation capabilities for advanced threats and breaches.
Security company strengthens Algerian operations
Pilgrims Group is strengthening its position in Algeria with the appointment of a new Country Director
Award recognition for ForeScout channel partner
High revenue growth rates in 2014 for enterprise sales has earned the 2014 ForeScout EMEA Channel Partner Award for NTT Com Security
IoT risk management guidelines
ISACA issues a set of guidelines on how to manage risk associated with connected devices in the Internet of Things
Enterprise security will become a business challenge in 2015
Rob Lay, Solutions Architect for Enterprise and Cyber Security in UK & Ireland at Fujitsu explains the growing challenges associated with enterprise security
VMS available for Oracle Solaris
The Phoenix RSM video management software (VMS) from SoleraTec is available for operating on the Oracle Solaris 11 operating system
Scalable PSIM on show at Intersec event
VidSys is attending the Intersec event in Dubai with its scalable Physical Security Information Management platform
Only half of UK critical business data secured
Research from NTT Com Security reveals extent of insecure data and lack of insurance within the structure of UK companies
Interoperability alliance strengthens access and threat management
ForeScout and Palo Alto Networks have integrated their products to offer greater threat management and network resource access control based on the ControlFabric platform
Swiss IT security company acquisition
NTT Com Security further expands its presence in Europe with the acquisition of Swiss IT security company, InfoTrust
Network security UK parner award
Palo Alto Networks has recognized NTT Com Security with UK Partner and EMEA Reseller of the Year awards
Measuring success in threat management programmes
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
Creating an IT Metrics programme to Safeguard the Network
Sujata Ramamoorthy and Hessel Heerebout of Cisco Systems explain the importance of setting up a unified IT security metrics programme
Secure private messaging system patented
Maxxess to attend ASIS to demonstrate its Ambit secure communications technology developed for the security industry
Risk management event to explore balance between opportunity and security
Security strategy director at NTT Com Security to present on shedding old style constraints at the Gartner Security and Risk Management summit in London
Incident management software for healthcare facility
A healthcare provider in New York will use PPM 2000 incident management software for reporting, despatching and case management
Cyber security report: 96 percent of organisations have experienced a serious incident in past year
Sponsored by ForeScout Technologies, the 2014 Cyber Defence Maturity Report is independent research conducted by IDG Connect during May and June of 2014. Survey respondents included 1600 IT information security decision makers in organisations of more than 500 employees, and spanning five industry s
A quarter of attacks target web services and applications
Threat data from NTT Com Security indicates levels of attacks being used to target web services and applications in the UK
Advanced SIEM for improved detection rates
NTT Com Security is improving the detection of unknown threats with its advanced security information and event management capabilities
Tokenless authentication protects insurance broker
An insurance broker has taken SecurAccess tokenless authentication for improving protection for user identification
Risk-based authentication supplier acquisition
Vasco is expanding into fraud detection and risk based authentication with the acquisition of Risk IDS
Protection of Chinese journalists in trouble spots
Pilgrims Group has been chosen to provide television channel in China with protection of journalists working in crisis regions including Ukraine
Chinese TV company takes risk management advice for reporters
Pilgrims Group is supporting the Chinese CCTV broadcasting company in risk management and assistance during reporting on the Philippines crisis
Encryption and identity award shortlist
CryptoAuditor and Universal SSH Key Manager from SSH Communications Security have been shortlisted for 2014 awards for encryption and identity systems
Hospital secures critical areas with IP access control
ACT has provided a hospital in Tunbridge Wells with an IP access control system for securing mission critical areas in the facility
Unified identity management and governance
Dell One Identity provides integrated identity governance and privileged access management for improved performance and lower costs
Advanced threat remediation technology
Comprehensive Threat Protection platform from McAfee provides extended capabilities for protection against advanced and evasive targeted threats
Risk management and compliance for cloud servers
Server Suite 2014 from Centrify provides protection from data centre risks relating to external attacks or the insider threat
Guarding services for publishing group
Immediate Media is using the services of Pilgrims Group for the protection of its staff in UK offices
Big data analytics for improved understanding of sensitive assets
Research report shows the benefits of using metadata for the analysis of sensitive information in unstructured data
European conference on the protection of critical infrastructure
Critical infrastructure protection is at the heart of a new conference which will take place for security system providers and risk managers during February in London
Predictive security intelligence collaboration
Tripwire is collaborating with Core Security for the integration of predictive security intelligence with network security elements
Critical infrastructure protection in the Middle East
The protection of the Middle East's critical infrastructure out to 2018 is the subject fo a market research report covering both physical and IT security
Today’s Core Network Security Requires a New Approach to Prevent against Destructive SQL Attacks
Michael Sabo, VP of Marketing at DB Networks explains the continued prominence of SQL injection attacks and the approaches needed for their prevention
Baltimore PSIM deployment gains award for VidSys
PSIM software supplier VidSys has won a Homeland Security Award for the application of its systems for Baltimore metropolitan situational awareness
Improvements required in healthcare security management
Survey results demonstrate requirements for improved risk assessment in the healthcare industry to increase IT security protection
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo