Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
IT Security
August 2015 threat report available
Anti-virus and anti-malware software : 01 September, 2015
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years.
Young people lack trust in digital security
Data Protection : 27 August, 2015
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity
Agentless protection for Windows 10 BYOD devices
Network Security, Routers and Data Centres : 27 August, 2015
CounterACT provides security professionals with the tools needed to cope with the deluge of Windows 10 BYOD device network connections
Survey shows increase in targeted attacks
Data Protection : 19 August, 2015
A survey conducted by Tripwire at Black Hat USA gauges the feelings of IT security professionals on the potential for nation-state cyber attacks
SMS based 2FA password reset service
Authentication : 19 August, 2015
Identity management service provider chooses SMS PASSCODE for performing password reset functions using two factor authentication to reduce help desk burden
Partnership for mobile wallet payments
Finance and Banking Security : 18 August, 2015
MeaWallet has gone into partnership to provide cloud based mobile payments for EMV card holders
Endpoint security software for businesses running Macs
Anti-virus and anti-malware software : 18 August, 2015
The Endpoint Security for Mac product from Kaspersky lab provides single console management for Mac oriented businesses
The silent approach of advanced persistent threats
Data Protection : 17 August, 2015
High Tech Bridge explains how easily advanced persistent threats infiltrate the IT network of an organisation exposing vulnerabilities
Multiple mac device security
Anti-virus and anti-malware software : 17 August, 2015
Flextivity 1.5 provides cloud based security and monitoring for small businesses operating Mac equipment
Business centre operator upgrades firewalls
Network Security, Routers and Data Centres : 14 August, 2015
Network infrastructure at Regus has been improved with next generation firewalls for secure remote access
Fake Windows 10 upgrade hides ransomware
Anti-virus and anti-malware software : 10 August, 2015
Bitdefender issues warning of ransonware spread through fake e-mails which solicit users to upgrade to latest Windows operating system
Mobile threat protection for iOS and Android
Mobile computing security : 10 August, 2015
Users of Android and Apple mobile devices now have access to mobile security software for threat detection and resolution
Stopping the insider threat
Data Protection : 10 August, 2015
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme
Behavioural anomoly detection with threat analytics
Data Protection : 10 August, 2015
Holistic Threat Analytics Suite provides endpoint visibility of advanced threat compromised accounts
Protection from malicious mobile apps
Mobile computing security : 10 August, 2015
Corporate defence software from Proofpoint provides organisations with protection against vulnerabilities on mobile smartphone devices
Effective archiving to avoid data swamps
Backup, Data Recovery and Disaster Recovery : 07 August, 2015
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies
The IoT Botnets are Coming: Are You Prepared?
Data Protection : 07 August, 2015
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited
Securing the IoT with the Help of Multi-Factor Authentication
Authentication : 30 July, 2015
David Hald of SMS PASSCODE explains how multi factor authentication can be used as a robust security measure for the Internet of Things
Integrated security software for Windows 10
Anti-virus and anti-malware software : 30 July, 2015
Bitdefender responds to Windows 10 release with revised security software which provides seamless integration with the new operating system from Microsoft
Who is Winning the Internet Security War?
Internet Security and Content Filtering : 30 July, 2015
New Net Technologies describes how a combination of tactics are required in order to stay ahead of cyber criminals
Marketing appointment completes top management line-up at ForeScout
Network Security, Routers and Data Centres : 21 July, 2015
ForeScout CEO, Michael DeCesare explains his thinking behind the powerful senior team recently appointed to lead the company into a market-led future.
Extended firewall connectivity on threat analysis software
Data Protection : 21 July, 2015
The latest version of BeyondInsight now covers improved connectivity with Palo Alto firewall data analysis capability
Identity defined security the next priority
Authentication : 20 July, 2015
Clare Rees of Ping Identity examines social media trends in IT security and why identity defines security should be the next priority.
Survey reveals internet romance dangers
Internet Security and Content Filtering : 17 July, 2015
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers.
Threat intelligence unit formed for mobile security
Mobile computing security : 17 July, 2015
Mobile security company AdaptiveMobile is sharing its expertise in best security practices as part of its newly formed Threat Intelligence Unit.
Financial audit company offers web security services
Internet Security and Content Filtering : 17 July, 2015
Partnership with High Tech Bridge brings web application security services to clients of PriceWaterhouseCoopers of Switzerland.
Managed Internet of Things security service
Internet Security and Content Filtering : 17 July, 2015
IT security company steps into the IoT arena with a managed service to assist companies with the management of security of the internet of things.
Continued access to corporate data for ex-employees
Data Protection : 17 July, 2015
Survey by Centrify shows how common it is for former employees to continue to have access to corporate data after they have left the company.
Malware attacks target public sector
Anti-virus and anti-malware software : 22 June, 2015
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
High cost of data breaches for UK businesses
Anti-virus and anti-malware software : 22 June, 2015
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert
Next generation firewall with web filtering for schools
Network Security, Routers and Data Centres : 22 June, 2015
Barracuda Networks is targeting the education sector with its latest Firewall product with web filtering to improve school cyber security
Industry specialist joins ForeScout board of directors
Network Security, Routers and Data Centres : 22 June, 2015
Network threat mitigation company takes FireEye CEO on to its board of directors as vice chairman
Security policy change management automation
Software Asset Management and Compliance : 16 June, 2015
Latest security management suite from AlgoSec provides complete policy change management for AWS as well as on-premises environments
Multi-factor authentication for Orange cloud based applications
Authentication : 16 June, 2015
Orange Business Services will use the SafeNet multi-factor authentication service from Gemalto for customer corporate applications
Award success for Network Access Control platform
Network Security, Routers and Data Centres : 15 June, 2015
CounterACT from ForeScout Technologies has been judged to be the best NAC solution in the SC Magazine awards this year
Software licence specialist joins fight against theft
Software Asset Management and Compliance : 10 June, 2015
Gemalto joins the Federation Against Software Theft to bring education to smaller companies on the subject of licensing and entitlement
Response profile assessment tool
Network Security, Routers and Data Centres : 10 June, 2015
A new tool is available from Arbor Networks for assessing incident response profiles for identifying and responding to cyber attacks
Hardware encrypted USB 3.0 hard drive
Data Protection : 10 June, 2015
Imation is now offering FIPS 140-2 Level 3 certified 256-bit hardware encryption on a USB 3.0 high capacity hard drive for secure storage
Vulnerability management and real time assessment partnership
Network Security, Routers and Data Centres : 10 June, 2015
ForeScout is extending its range or interoperability with a new partnership with vulnerability assessment specialist, Qualys
Wireless represents highest vulnerability according to survey
Network Security, Routers and Data Centres : 08 June, 2015
Fortinet reveals the results of a survey it conducted in which IT decision makers state their belief that wireless networks represent their highest vulnerability
ICO reports fall short of real level of UK data breaches
Data Protection : 08 June, 2015
Data Protection Act breaches could be more than ten times the levels reported to the Information Commissioners Office in the country
Survey looks at password frustration
Data Protection : 08 June, 2015
Centrify conducts survey amongst security professionals on frustrations suffered as a result of not remembering passwords
Cloud based real time content filtering
Internet Security and Content Filtering : 08 June, 2015
Bloxx is now offering its real time web content filtering products off the premises with Tru-View Cloud
Tokenization for protection of cloud data
Cloud Computing Security : 05 June, 2015
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud
Assessing cyber risk goes beyond counting vulnerabilities
Data Protection : 02 June, 2015
Matt Alderman, VP of Strategy at Tenable Network Security explains how organisations can improve their risk assessment and reduce vulnerabilities
Confidential e-mail encryption
Data encryption : 02 June, 2015
A belt and braces approach to secure e-mail with both password and certificate based encryption
Report analyses 1Q2015 IT security events
Data Protection : 02 June, 2015
Panda Security examines the IT security landscape during the first quarter of the year with trojans continuing to be the most common threat
Intelligent packet capture for improved incident response
Network Security, Routers and Data Centres : 02 June, 2015
Lancope is at the InfoSecurity event this week in London with its PacketWatch product for intelligent packet capture
IT security interoperability demos at Infosecurity Europe
Network Security, Routers and Data Centres : 02 June, 2015
ForeScout Technologies is attending Infosecurity Europe with demonstrations of ControlFabric based interoperability in conjunction with major partners
IRS hack exposes personally identifiable information
Anti-virus and anti-malware software : 01 June, 2015
Security company Sophos comments on the recent breach experienced by the US Inland Revenue Service exposing personal tax payer information
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo