|
Biometric methods comparison from Frost and Sullivan |
|
|
Books, magazines, journals, analysis and reports
: 01 May, 2008 |
Report examines comparisons between different biometric technologies such as fingerprint and facial recognition software in view of the improved demand for such products in APAC. |
|
|
|
|
 |
|
|
|
|
International Members evening arranged to coincide with IFSEC |
|
|
Trade Organisations, User Groups and Pressure Groups
: 30 April, 2008 |
Members of the Security Institute from abroad are invited to a members evening in Coventry near Birmingham during IFSEC 2008 where the Institute will also be launching their new certificate in security management. |
|
|
|
|
 |
|
|
Global business fraud report from Kroll. |
|
|
Books, magazines, journals, analysis and reports
: 29 April, 2008 |
Supply chain fraud indicators examined in Kroll report focussing on risks for global businesses. |
|
|
|
|
 |
|
|
Seminar to be held on biometric encryption. |
|
|
Training courses, Seminars and Conferences
: 28 April, 2008 |
Industry experts and suppliers to gather in Amsterdam for Biometric Encryption Seminar to be held in June by the European Biometric Forum. |
|
|
|
|
 |
|
|
Transport security show to be held in June |
|
|
Exhibitions and Trade Shows
: 28 April, 2008 |
International trade show dedicated to the transport industry and supply chain security to be held in Amsterdam during June. |
|
|
|
|
 |
|
|
|
|
|
|
|
|
IT governance and risk conference |
|
|
Training courses, Seminars and Conferences
: 22 April, 2008 |
Conference addressing the needs for risk, compliance and IT governance management to be held by Comsec Consulting in London. |
|
|
|
|
 |
|
|
|
|
Book available on digital crime investigation. |
|
|
Books, magazines, journals, analysis and reports
: 21 April, 2008 |
In its latest book, Investigating Digital Crime, Research and Markets looks at the relationship between cybercrime and the growth in IT. |
|
|
|
|
 |
|
|
|
|
Information Security Awareness Week launches. |
|
|
Exhibitions and Trade Shows
: 21 April, 2008 |
In a week packed with activities and featured events including InfoSecurity Europe in London, users can gain insight into the true benefits of information security. |
|
|
|
|
 |
|
|
|
|
Northern England chapter of ACFE launched |
|
|
Trade Organisations, User Groups and Pressure Groups
: 18 April, 2008 |
Certified Fraud Examiners Association opens north west division to cover members needs in the Leeds, Manchester and Liverpool areas. |
|
|
|
|
 |
|
|
|
|
NSI sponsors IFSEC apprentice skills challenge. |
|
|
Trade Organisations, User Groups and Pressure Groups
: 17 April, 2008 |
Popular apprentice skills challenge at the IFSEC security exhibition to be sponsored this year by the National Security Inspectorate. |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Security innovation challenge offers large prize fund. |
|
|
Trade Organisations, User Groups and Pressure Groups
: 15 April, 2008 |
Competition now open for the Global Security Challenge, available for innovators and new companies in the security market for ideas for homeland security projects. |
|
|
|
|
 |
|
|
Monitoring employee travel at Munro Group. |
|
|
Legal, insurance and recruitment
: 14 April, 2008 |
Business travellers using Munro Travel Group gain the advantage of additional protection based on Anvil Group's Employee Travel Monitoring. |
|
|
|
|
 |
|
|
Security Institute Chairman address to membership. |
|
|
Trade Organisations, User Groups and Pressure Groups
: 14 April, 2008 |
Address by the Chairman of the Security Institute to its membership at the recently held Annual General Meeting outlines benefits of memberships and calls for more recruitment. |
|
|
|
|
 |
|
|
|
|
|
|
Security Institute events to end of 2nd quarter. |
|
|
Training courses, Seminars and Conferences
: 11 April, 2008 |
Bookings are being taken for a series of events being run by the Security Institute for its membership including talks, seminars and social events. |
|
|
|
|
 |
|
|
|
|
Protection technology deployment survey. |
|
|
Installers, Integrators and Consultants
: 10 April, 2008 |
Perimeter security for IT systems shows strong preference for firewalls and physical security according to survey conducted by (ISC)2 |
|
|
|
|
 |
|
|
Skills for Security to take prominent role in IFSEC 2008 |
|
|
Training courses, Seminars and Conferences
: 10 April, 2008 |
With a series of not-to-miss seminars, the popular Apprenticeship Challenge and a conference covering a wide area of topics, Skills for Security will be taking a significant position in Europe's largest security exhibition. |
|
|
|
|
 |
|
|
US border control briefing by Frost and Sullivan. |
|
|
Books, magazines, journals, analysis and reports
: 10 April, 2008 |
With growing acceptance of Biometrics technology by the US Government, Frost and Sullivan gather analysts to examine the related issues. |
|
|
|
|
 |
|
|
European LBS to boom in next five years |
|
|
Books, magazines, journals, analysis and reports
: 09 April, 2008 |
Location Based Services are set to increase to comprise over 100 million mobile users in Europe during the next five years according to Berg Insight report. |
|
|
|
|
 |
|
|
US healthcare data vulnerability report. |
|
|
Books, magazines, journals, analysis and reports
: 09 April, 2008 |
Poor awareness and focus on other matters of medical privacy leaves US healthcare organisations lacking in the field of patient data privacy according to Kroll report. |
|
|
|
|
 |
|
|
|
|
2008 RSA conference opens in San Francisco. |
|
|
Training courses, Seminars and Conferences
: 08 April, 2008 |
Line up of expert speakers and wide section of educational tracks enable visitors to this year's RSA Conference to stay abreast of all IT security developments. |
|
|
|
|
 |
|
|
XACML interoperability demonstrations. |
|
|
Training courses, Seminars and Conferences
: 08 April, 2008 |
The RSA Conference provides the venue for demonstrations of interoperability within the XACML standard. |
|
|
|
|
 |
|
|
|
|
|
|
Survey puts disaster recovery effectiveness into doubt. |
|
|
Exhibitions and Trade Shows
: 04 April, 2008 |
Although the majority of businesses now have disaster recovery procedures in place, a recent survey reveals that many have not tested these procedures and would suffer major losses during any period of outages. |
|
|
|
|
 |
|
|
IT Log management and data security. |
|
|
Exhibitions and Trade Shows
: 04 April, 2008 |
Chris Petersen of LogRythm explains how IT event logs need to be carefully managed to prevent them from being the cause of information security exposures. |
|
|
|
|
 |
|
|
|
|
|
|
Bringing IT defences under the umbrella of UTM. |
|
|
Exhibitions and Trade Shows
: 04 April, 2008 |
Fortinet's Regional Director, Paul Judd argues the case for deploying unified threat management as a more effective method of protecting IT resources than lining the virtual trenches with disparate weaponry. |
|
|
|
|
 |
|
|
|
|
|
|
Protecting IT assets beyond the firewall. |
|
|
Exhibitions and Trade Shows
: 04 April, 2008 |
Shlomo Touboul of Yoggie Security Systems shows that the protection of mobile employees is an important part of an integrated data protection system. |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
First | Prev | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | Next | Last |