|
August 2015 threat report available |
|
|
Anti-virus and anti-malware software
: 01 September, 2015 |
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years. |
|
|
|
|
 |
|
|
Young people lack trust in digital security |
|
|
Data Protection
: 27 August, 2015 |
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity |
|
|
|
|
 |
|
|
Agentless protection for Windows 10 BYOD devices |
|
|
Network Security, Routers and Data Centres
: 27 August, 2015 |
CounterACT provides security professionals with the tools needed to cope with the deluge of Windows 10 BYOD device network connections |
|
|
|
|
 |
|
|
Survey shows increase in targeted attacks |
|
|
Data Protection
: 19 August, 2015 |
A survey conducted by Tripwire at Black Hat USA gauges the feelings of IT security professionals on the potential for nation-state cyber attacks |
|
|
|
|
 |
|
|
SMS based 2FA password reset service |
|
|
Authentication
: 19 August, 2015 |
Identity management service provider chooses SMS PASSCODE for performing password reset functions using two factor authentication to reduce help desk burden |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Multiple mac device security |
|
|
Anti-virus and anti-malware software
: 17 August, 2015 |
Flextivity 1.5 provides cloud based security and monitoring for small businesses operating Mac equipment |
|
|
|
|
 |
|
|
|
|
Fake Windows 10 upgrade hides ransomware |
|
|
Anti-virus and anti-malware software
: 10 August, 2015 |
Bitdefender issues warning of ransonware spread through fake e-mails which solicit users to upgrade to latest Windows operating system |
|
|
|
|
 |
|
|
|
|
Stopping the insider threat |
|
|
Data Protection
: 10 August, 2015 |
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme |
|
|
|
|
 |
|
|
|
|
Protection from malicious mobile apps |
|
|
Mobile computing security
: 10 August, 2015 |
Corporate defence software from Proofpoint provides organisations with protection against vulnerabilities on mobile smartphone devices |
|
|
|
|
 |
|
|
Effective archiving to avoid data swamps |
|
|
Backup, Data Recovery and Disaster Recovery
: 07 August, 2015 |
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies |
|
|
|
|
 |
|
|
The IoT Botnets are Coming: Are You Prepared? |
|
|
Data Protection
: 07 August, 2015 |
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited |
|
|
|
|
 |
|
|
|
|
Integrated security software for Windows 10 |
|
|
Anti-virus and anti-malware software
: 30 July, 2015 |
Bitdefender responds to Windows 10 release with revised security software which provides seamless integration with the new operating system from Microsoft |
|
|
|
|
 |
|
|
Who is Winning the Internet Security War? |
|
|
Internet Security and Content Filtering
: 30 July, 2015 |
New Net Technologies describes how a combination of tactics are required in order to stay ahead of cyber criminals |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Survey reveals internet romance dangers |
|
|
Internet Security and Content Filtering
: 17 July, 2015 |
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers. |
|
|
|
|
 |
|
|
|
|
|
|
Managed Internet of Things security service |
|
|
Internet Security and Content Filtering
: 17 July, 2015 |
IT security company steps into the IoT arena with a managed service to assist companies with the management of security of the internet of things. |
|
|
|
|
 |
|
|
|
|
Malware attacks target public sector |
|
|
Anti-virus and anti-malware software
: 22 June, 2015 |
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector |
|
|
|
|
 |
|
|
High cost of data breaches for UK businesses |
|
|
Anti-virus and anti-malware software
: 22 June, 2015 |
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert |
|
|
|
|
 |
|
|
|
|
|
|
Security policy change management automation |
|
|
Software Asset Management and Compliance
: 16 June, 2015 |
Latest security management suite from AlgoSec provides complete policy change management for AWS as well as on-premises environments |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Response profile assessment tool |
|
|
Network Security, Routers and Data Centres
: 10 June, 2015 |
A new tool is available from Arbor Networks for assessing incident response profiles for identifying and responding to cyber attacks |
|
|
|
|
 |
|
|
Hardware encrypted USB 3.0 hard drive |
|
|
Data Protection
: 10 June, 2015 |
Imation is now offering FIPS 140-2 Level 3 certified 256-bit hardware encryption on a USB 3.0 high capacity hard drive for secure storage |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Survey looks at password frustration |
|
|
Data Protection
: 08 June, 2015 |
Centrify conducts survey amongst security professionals on frustrations suffered as a result of not remembering passwords |
|
|
|
|
 |
|
|
Cloud based real time content filtering |
|
|
Internet Security and Content Filtering
: 08 June, 2015 |
Bloxx is now offering its real time web content filtering products off the premises with Tru-View Cloud |
|
|
|
|
 |
|
|
Tokenization for protection of cloud data |
|
|
Cloud Computing Security
: 05 June, 2015 |
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud |
|
|
|
|
 |
|
|
|
|
Confidential e-mail encryption |
|
|
Data encryption
: 02 June, 2015 |
A belt and braces approach to secure e-mail with both password and certificate based encryption |
|
|
|
|
 |
|
|
Report analyses 1Q2015 IT security events |
|
|
Data Protection
: 02 June, 2015 |
Panda Security examines the IT security landscape during the first quarter of the year with trojans continuing to be the most common threat |
|
|
|
|
 |
|
|
|
|
|
|
|
|
First | Prev | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next | Last |