Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
IT Security
Call for cloud-based digital signature recognition in EU standards
Data Protection : 26 March, 2015
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate
Matching security to increased network performance
Network Security, Routers and Data Centres : 26 March, 2015
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems
Secure Email and FTP protects sensitive pupil data
Data encryption : 23 March, 2015
Primary school in London borough of Ealing adopts e-mail and file encryption service to protect pupil data in e-mails and file transfers
Financial services compliance expansion
Software Asset Management and Compliance : 20 March, 2015
Additional functions available on Proofpoint Enterprise Archive for improving compliance of financial services companies to regulatory requirements
Insider threat protection to increase during 2015
Data Protection : 20 March, 2015
Research from IS Decisions shows that existing levels of just of 40 percent for insider threat protection will increase within the UK during this year
Three key IT security focus areas identified
Data Protection : 19 March, 2015
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
Hardware encrypted USB storage with PIN access
Data encryption : 19 March, 2015
Solid state secure memory device with hardware encryption from iStorage is available with PIN based access control
Virtualised cloud communication security
Cloud Computing Security : 18 March, 2015
The virtualised real-time communications system from Sonus Networks brings enhanced security and intelligence
Cloud based digital signing for clinical trials
Authentication : 12 March, 2015
SureClinical is using nShield hardware security modules from Thales for secure digital signing in clinical trials
Secure data on the move for TfL using hardware encrypted flash memory
Data encryption : 12 March, 2015
Hardware encrypted secure USB storage devices by iStorage are being used by Transport for London to help prevent loss of mobile data
Unified Security Management for card payment system provider
Data Protection : 12 March, 2015
Crosskey has chosen Unified Security Management from AlienVault for increased security visibility in its card payment processing operations
Student loan agency employs multi factor authentication
Authentication : 12 March, 2015
A US student loan service provider is using IDPrime .NET from Gemalto for multi-factor authentication to replace passwords
Security-as-a-Service firewall available in Holland
Network Security, Routers and Data Centres : 11 March, 2015
Clavister partners in Holland are now able to offer the company's Security-as-a-service firewall for managed security service providers
Proactive document threat detection
Anti-virus and anti-malware software : 11 March, 2015
Check Point Threat Extraction takes a new approach to eliminating the threats posed by infected documents
New malware bypasses CAPTCHA
Anti-virus and anti-malware software : 11 March, 2015
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money
New wave of Cryptowall ransomware attacks
Anti-virus and anti-malware software : 10 March, 2015
Bitdefender uncovers new distribution mechanism for the Cryptowall ransomware through spam campaign
Natural language processing for preventing spear phishing
Anti-virus and anti-malware software : 10 March, 2015
OpenDNS develops new model of making real-time detections of targetted phishing campaigns using natural language processing
Key actions needed to ensure digital safety
Data Protection : 10 March, 2015
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe
On-demand web penetration testing available to security suppliers
Internet Security and Content Filtering : 06 March, 2015
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
Console provides real time social media threat information
Data Protection : 06 March, 2015
Proofpoint is now supplying its Nexgate Social Threat Centre, a console for providing administrators with up to date information on social media threats
End to end control for real time communications networks
Network Security, Routers and Data Centres : 05 March, 2015
Sonus IQ has been released to provide real time communications network operators with a security and intelligence platform
Mobile security for wearable technology
Mobile computing security : 05 March, 2015
LG Electronics is making use of mobile access control from baimos technologies for its latest wearable devices
Centralised e-mail encryption
Data encryption : 05 March, 2015
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
Poor management of social messaging and file sharing in business
Data Protection : 05 March, 2015
A study undertaken by Iron Mountain shows an alarmingly low level of management of third party file-sharing systems and social messaging in the enterprise
Multi-factor authentication for wearable technology
Authentication : 04 March, 2015
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
Intelligent protection combats grey route mobile messaging
Mobile computing security : 04 March, 2015
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
Big data analytics provide network investment decision support
Network Security, Routers and Data Centres : 04 March, 2015
CommsReveal from BAE Systems is designed to provide network intelligence through big data analytics to communications service providers to enable decisions to be made on investments and network changes
Collaboration extends NFC adoption opportunities
Mobile computing security : 04 March, 2015
Virtual access, ID and other card system implementations have been simplified through a technology collaboration between NXP Semiconductors and MeaWallet
The most dangerous IT threats of the year and how to neutralise them
Network Security, Routers and Data Centres : 02 March, 2015
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
IT security and the Internet of Things
Anti-virus and anti-malware software : 02 March, 2015
Luis Corrons of Panda Security explains how the Internet of Things provides new opportunities for cyber criminals in an increasingly connected world
Cloud based real time communications demonstration at MWC
Cloud Computing Security : 02 March, 2015
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
Third party loophole behind TalkTalk breach
Data Protection : 02 March, 2015
LogRhythm discusses the need for controlling third-party organisation IT security to reduce the threat of corporate data breaches
New CEO appointed at ForeScout Technologies
Network Security, Routers and Data Centres : 02 March, 2015
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer
Award recognition for ForeScout channel partner
Network Security, Routers and Data Centres : 27 February, 2015
High revenue growth rates in 2014 for enterprise sales has earned the 2014 ForeScout EMEA Channel Partner Award for NTT Com Security
Research published on Security-as-a-Service for communication service providers
Network Security, Routers and Data Centres : 27 February, 2015
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
Aggressive adware still being seen in Android apps
Mobile computing security : 27 February, 2015
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender
Preventable software failures plagued 2014
Data Protection : 25 February, 2015
SQS reviews 2014 with a list of the top software failures of the year and their impact, including the infamous Heartbleed bug
Host service provider strategies to defend against DDoS attacks
Anti-virus and anti-malware software : 25 February, 2015
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
Comprehensive security for mobile operator signalling infrastructure
Network Security, Routers and Data Centres : 25 February, 2015
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks
Lessons learned from web mobile application vulnerabilities
Data Protection : 23 February, 2015
Adrian Beck of Veracode looks back at some of the main data breach incidents of 2014 and explains what could be done to prevent them
Device timer regulates offline use of endpoints
Network Security, Routers and Data Centres : 19 February, 2015
Absolute Computrace enables network administrators to set offline usage policies with a trace and freeze options for endpoints
Hardware encrypted flash drives now available as USB 3.0 devices
Data Protection : 19 February, 2015
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity
Eight reasons to deploy multi-factor authentication
Authentication : 19 February, 2015
David Hald of SMS Passcode provide compelling reasons why Multi-Factor Authentication should be implemented for greater security
Pre-infection threat detection acquisition
Anti-virus and anti-malware software : 19 February, 2015
Check Point goes to the next step of threat detection with the acquisition of a company which provides CPU-level malware prevention technology
Five steps to secure iterative software delivery
Data Protection : 18 February, 2015
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
Cloud service for using Android trusted environment
Mobile computing security : 18 February, 2015
Android app developers requiring data protection against malware from other software loaded on devices can now make use of the MyTAM cloud service for employing on-device Trusted Execution Environment
Arabic cyber espionage aims at high profile targets in Middle East
Anti-virus and anti-malware software : 18 February, 2015
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region
Defending company assets against the latest onslaught of cyber attacks
Data Protection : 18 February, 2015
Kalyan Kumar of HCL Technologies looks at the best defence strategies that organisations can use to protect themselves from increasingly sophisticated and effective cyber threats
Hardware security modules provide clinical trial security
Data Protection : 18 February, 2015
Digital signing of documents associated with clinical trials is being protected with the use of nShield hardware security modules from Thales E-Security
Company enters collaboration for military cyber protection
Network Security, Routers and Data Centres : 16 February, 2015
Critical communications systems of military forces will gain enhanced protection through a partnership involving cyber security experts at Clavister
First | Prev  | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo