Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Android malware steals information
Mobile computing security : 21 January, 2016
Kaspersky Lab discovers new Android malware that targets smartphone users for financial fraud
 
Range expanded for modular data centres
Network Security, Routers and Data Centres : 21 January, 2016
ICTroom now provides more options for companies requiring customised data centres with scalability.
 
Cybersecurity company growth leads to additional funding
Network Security, Routers and Data Centres : 21 January, 2016
ForeScout Technologies gains late-stage funding to expand operations and grow into Intenet of Things security
 
Name change reflects fresh approach to IT security
Internet Security and Content Filtering : 18 January, 2016
Websense has now become Forcepoint combining the technologies of the IT security companies in the Raytheon group to provide a more consolidated approach to protection
 
Collaboration for improved wearable security
Anti-virus and anti-malware software : 18 January, 2016
WISeKey and Kaspersky Lab cooperate on defining the security requirements of the Internet of Things with particular emphasis on wearable technology such as payment wristbands
 
USB memory devices left at dry cleaners often never returned
Anti-virus and anti-malware software : 15 January, 2016
A survey from ESET amongst dry cleaners uncovered the proportion of USB memory sticks and mobile phones that are left in pockets and never get claimed
 
E-banking protection for Swiss asset manager
Finance and Banking Security : 15 January, 2016
Vontobel of Switzerland is providing e-banking protection to its customers with the use of the mIDentity security platform from Kobil
 
Credential compromise a key IT security concern
Authentication : 15 January, 2016
Research amongst security professionals reveals that nine out of ten consider compromised credentials to be a top concern
 
New iteration of Linux encoder ransomware discovered
Anti-virus and anti-malware software : 12 January, 2016
Bitdefender is offering a free tool to unlock files affected by the latest iteration of the Linux Encoder ransomware
 
TV streaming stick leaves home networks vulnerable
Anti-virus and anti-malware software : 12 January, 2016
Check Point uncovers vulnerability that allows hackers to infiltrate home network through a TV streaming stick
 
Flow processing adapter for network monitoring
Network Security, Routers and Data Centres : 12 January, 2016
Accolade releases a quad 10GbE application acceleration network adapter for use in network monitoring and security systems.
 
Security and networking specialist joins ForeScout
Network Security, Routers and Data Centres : 07 January, 2016
Former Sales specialist at F5 Networks takes on the role of VP for EMEA Sales at ForeScout Technologies.
 
Free API for website SSL implementation testing
Internet Security and Content Filtering : 06 January, 2016
Webmasters can now take advantage of a free API to provide security testing services for SSL/TLS implementations
 
The increasing problem of Shadow IT
Authentication : 29 December, 2015
SecurEnvoy explains Shadow IT and how the use of two-factor authentication within apps could provide organisations with the security they need
 
Enterprise phishing susceptibility report available
Anti-virus and anti-malware software : 23 December, 2015
Report from PhishMe provides analytics of phishing susceptibility of corporate businesses based on studies made using simulation e-mails
 
Endpoint protection company acquisition
Anti-virus and anti-malware software : 23 December, 2015
Sophos has bought endpoint threat protection and advanced threat prevention specialist, SurfRight.
 
Half of companies believe DDoS attacks are staged against them
Anti-virus and anti-malware software : 14 December, 2015
Survey from Kaspersky Lab reveals extent to which companies believe they are the victims of staged attacks launched by identifiable culprits
 
Strong authentication across Bluetooth
Authentication : 14 December, 2015
Bluetooth Smart technology used for bringing public key cryptographic based authentication to mobile devices
 
European airline solves complex network access challenges
Network Security, Routers and Data Centres : 14 December, 2015
Vueling Airlines is using ForeScout CounterACT to provide real-time visibility of both corporate and partner endpoints and users on its network.
 
Top Malware families for October
Anti-virus and anti-malware software : 01 December, 2015
Conficker at the top of the list by Check Point of the most frequently seen malware families being used in attacks on businesses
 
FAST responds to UK cyber crime government inquiry
Software Rights Management : 27 November, 2015
The risks associated with buying non-genuine software have been submitted for consideration in the latest inquiry being held on cyber crime
 
Ready access to information causes digital amnesia
Data Protection : 27 November, 2015
Kaspersky Lab researches global attitudes towards information retention and the easy availability to digital memory sources
 
Two-thirds of workers break security rules to work remotely
Data Protection : 27 November, 2015
Survey shows the vast majority of organisations now support home working despite the risks associated with employees taking security shortcuts
 
Cybercrime predominance in financial theft
Anti-virus and anti-malware software : 23 November, 2015
Kaspersky Lab research into cybercrime in the Russian language reveals nearly all of it relates to the theft of money
 
CISO panel initiative for expertise sharing
Data Protection : 23 November, 2015
CyberArk initiates a CISO panel for sharing experience and expertise in overcoming the challenges of privileged access control
 
Holistic threat protection for Wolverhampton College
Anti-virus and anti-malware software : 19 November, 2015
Midlands education centre protects its network with holistic security system incorporating firewall, application controls and anti malware software
 
Integrated IT security aids Turkish Credit Bureau
Network Security, Routers and Data Centres : 19 November, 2015
ForeScout Technologies chosen by KKB Credit Bureau in Turkey for providing the platform to secure the network and integrate security systems.
 
Secure mobile payment app
Payment cards and e-commerce security : 13 November, 2015
Swiss company enabling secure mobile payments using smartphones with the help of mIDentity security platform from Kobil
 
Coalition formed on data centre services
Network Security, Routers and Data Centres : 13 November, 2015
ICTroom is meeting the challenges placed on data centre services by increasing IT complexity through a new partnership with Atos
 
Results released from software licensing research
Software Asset Management and Compliance : 13 November, 2015
Gemalto has released results examining attitudes to different software licensing models rigid licence options losing favour
 
Security specialist becomes founding CyberInvest member
Data encryption : 13 November, 2015
Becrypt commits to UK Government CyberInvest initiative by becoming a founding member
 
Windows 10 certified security software with new features
Anti-virus and anti-malware software : 11 November, 2015
Internet security software from BullGuard now includes additional features including encrypted Dropbox compatible file backup
 
Hardware security module monitoring platform
Payment cards and e-commerce security : 11 November, 2015
Thales is now providing companies that use hardware security modules with a management platform that provides usage visibility across all locations
 
Integrated endpoint and network security
Network Security, Routers and Data Centres : 11 November, 2015
Sophos Security Heartbeat combines the functions and advantages of endpoint protection with next generation firewalls and unified threat management
 
Research shows extent of network credential thefts
Network Security, Routers and Data Centres : 11 November, 2015
CyberArk research examines network exposure to credential theft attacks which hijack privileged credentials and compromise enterprise security
 
Data governance for file-sync services
Software Asset Management and Compliance : 09 November, 2015
Skyfence Cloud Gateway provides data loss prevention and governance on file-sync services such as Dropbox and Google Drive
 
Research reveals extent of senior management data loss
Data Protection : 09 November, 2015
A survey by Imation indicates nearly half of organisations have suffered theft or loss of senior management held devices containing corporate data
 
Technology integration brings high level access management to Dropbox
Authentication : 09 November, 2015
Dropbox file sync service has partnered with Centrify on the use of identity and access management technology for business users
 
Preventing data breaches with predictive threat models
Data Protection : 09 November, 2015
Metadata Framework platform enhanced with new set of predictive threat models to provide greater ability to prevent data breaches
 
Lack of encryption leads to fine for CPS
Data encryption : 09 November, 2015
ViaSat blames lack of encryption for the risks posed during the data breach at the CPS potentially exposing video material of victim and witness interviews
 
Security company to provide advice to EU utility companies
Data Protection : 06 November, 2015
The European Network for Cyber Security gains Gemalto as a partner to provide expertise to utilities in the region
 
Privacy protection for PC and mobile users
Anti-virus and anti-malware software : 06 November, 2015
Avast 2016 has been launched with improved privacy protection on mobile and desktop devices as well as automatic strong password generation
 
Decryption key repository means an end to cyber ransom payments
Data Protection : 06 November, 2015
Kaspersky Lab creates respository of decryption keys to enable victims of Bitcryptor and CoinVault ransomware to avoid paying to access their data
 
Threat awareness service extends deeper into cloud
Cloud Computing Security : 06 November, 2015
The Security Everywhere threat awareness service from Cisco has been extended to provide protection for endpoints and the cloud
 
Single sign on for Google Cloud Directory
Cloud Computing Security : 06 November, 2015
Users of Google connected services Cloud Directory and Google login can now make use of single sign-on application from Ping Identity
 
Keeping protection at the right level during rapid data growth
Network Security, Routers and Data Centres : 06 November, 2015
Dan Joe Barry, VP of Positioning at Napatech explains how network appliances trends and strategies affect the Data Growth Curve
 
BYOD and IoT at heart of ForeScout growth
Network Security, Routers and Data Centres : 30 October, 2015
Changes in the way networks are used plus recent high profile data breaches are driving high levels of growth at ForeScout Technologies
 
Lack of access management limits user mobility
Authentication : 27 October, 2015
Survey from Gemalto reveals widespread restrictions on mobile devices due to a lack of authentication and identity access management capabilities
 
Remote management for cloud based deployments
Authentication : 27 October, 2015
Thales launches remote administration and management system for use with nShield and payShield hardware security modules
 
NG firewall provides ministerial protection
Network Security, Routers and Data Centres : 27 October, 2015
A Government ministry in Malaysia is protecting its cloud based hosted applications with the W30 next generation firewall and other appliances from Clavister
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo