Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
Data Protection
Data privacy protection for investment management company
Data Protection : 12 January, 2015
Campbell Global is using DatAdvantage and IDU Classification Framework from Varonis for ensuring the security and privacy of its data
 
Enterprise security will become a business challenge in 2015
Data Protection : 08 January, 2015
Rob Lay, Solutions Architect for Enterprise and Cyber Security in UK & Ireland at Fujitsu explains the growing challenges associated with enterprise security
 
Reducing Cyber Risk with Trustworthy Best Practices
Data Protection : 08 January, 2015
Ed Paradise, Vice President of Engineering at Cisco explains industry best practice for cyber risk reduction
 
Partnership provides security for SAP ERP users
Data Protection : 11 December, 2014
SAP has agreed on reselling the HP Fortify application for security protection and the identification of software vulnerabilities
 
Sony Pictures incident an attack of free speech
Data Protection : 02 December, 2014
Thales comments on the notion that attacking the arts industry by nation states as an objection to film contents could be an attack on the right to free speech itself
 
UK consumers demand harsher penalties for data breaches
Data Protection : 01 December, 2014
Survey conducted by LogRhythm reveals the extent of frustration endured by UK consumers at data breaches suffered by organisations and the need for harsher penalties
 
UK and USA to collaborate on joint cyber crime initiative
Data Protection : 24 November, 2014
Cyber police exchange scheme could represent the start of a new approach in the fight against international cyber crime
 
Security policy orchestration for multiple platforms
Data Protection : 24 November, 2014
Tufin adds Amazon web services support to its security policy orchestration suite providing centralised security policy management across platforms
 
UK troops advised to leave personal devices at home
Data Protection : 24 November, 2014
Fears of hacking have resulted in British troops being advised not to take personal computing equipment with them when deployed on exercises
 
Compromised privileged accounts key to advanced targeted attacks
Data Protection : 21 November, 2014
Study by CyberArk identifies privileged accounts as being central to the latest wave of advanced targeted attacks
 
Advice for securing vulnerable webcams
Data Protection : 21 November, 2014
Kaspersky Lab provides advice on preventing webcam snooping after website discovered which streams unprotected footage
 
Managed security service for early threat detection
Data Protection : 20 November, 2014
Global threat intelligence at centre of portfolio of managed security services for early threat detection by Verizon
 
The EU cyber taskforce should only be the beginning
Data Protection : 19 November, 2014
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals
 
Top IT security predictions for 2015
Data Protection : 19 November, 2014
Websense has predicted the cybersecurity arena for 2015 with healthcare, the internet of things and credit card users top of the list of attack targets
 
Corporate data security trust restoration
Data Protection : 14 November, 2014
Paul Hampton, Payment & Crypto management expert at SafeNet explains the four steps required to restore trust in corporate data security
 
Use the Power of the Pyramid to Protect Critical Data
Data Protection : 13 November, 2014
Steve Martino, Chief Information Security Officer, Vice President, Information Security at Cisco explains the prioritization requirements of data protection
 
Only half of UK critical business data secured
Data Protection : 13 November, 2014
Research from NTT Com Security reveals extent of insecure data and lack of insurance within the structure of UK companies
 
Office worker survey shows high levels of complacency over data loss
Data Protection : 12 November, 2014
Imation has performed a study into company employee views on data risk and the vulnerability of confidential data in the hands of remote workers
 
Collaboration group to investigate connected vehicle security
Data Protection : 10 November, 2014
Intercede is part of a new collaborative group of industry partners examining the security implications of the emerging technology of connected vehicles
 
Cyber insurance goes hand in hand with good practices
Data Protection : 10 November, 2014
LogRhythm comments on the UK cyber-insurance market study and the need to combine insurance cover with good practices in protecting IT assets
 
Interactive incident timeline speeds up investigations
Data Protection : 07 November, 2014
The UserInsight behaviour analytics software from Rapid7 now features interactive incident timeline for faster investigation capability
 
Maintaining effectiveness in a changing security market
Data Protection : 20 October, 2014
Kevin Townsend explains the way the IT security industry is changing and how companies need to be both efficient and effective in what they do
 
Measuring success in threat management programmes
Data Protection : 16 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
 
Creating an IT Metrics programme to Safeguard the Network
Data Protection : 14 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco Systems explain the importance of setting up a unified IT security metrics programme
 
Low cost high security encrypted hard drive
Data Protection : 10 October, 2014
Imation has produced a high performance external USB 3.0 hard drive with cloud-based management console and Government grade security
 
FIPS validation for cloud visibility and data protection
Data Protection : 08 October, 2014
Cryptographic Module Validation Programme from CipherCloud gains Federal Information Processing Standards (FIPS) validation
 
Continuous file assessment gives security the edge in finding malware
Data Protection : 02 October, 2014
Terry Greer-King, Director of Cyber Security at Cisco explains Advanced Persistent Threats and the ability of modern security software in assessing vulnerabilities
 
Plain language PSN connectivity white paper
Data Protection : 29 September, 2014
McAfee is making it easy for companies needing to connect to the Public Services Network (PSN) in the UK through a plain language white paper
 
Technology partnerships extended to boost data security
Data Protection : 25 September, 2014
The Cipher Technology Partner Programme run by SafeNet now has further membership extending its reach and providing greater opportunities for data protection
 
Apple device management in the cloud
Data Protection : 23 September, 2014
The Centrify User Suite now includes the Mac 2014.1 component to manage and secure Mac and iOS more efficiently
 
How to keep contactless payment credentials secure
Data Protection : 22 September, 2014
Bitdefender explains the top security threats associated with the booming contactless payment industry with monthly spending now three times that of last year
 
Cyber threat programme assessment and development
Data Protection : 15 September, 2014
Rapid7 is now offering programme development services for cyber security through its Global Strategic Services Practice
 
Integration improves mitigation and response times
Data Protection : 11 September, 2014
UserInsight from Rapid7 now operates in conjunction with HP ArcSight ESM providing faster and more effective threat mitigation
 
Latest breach shows retail industry to be prime cyber attack target
Data Protection : 10 September, 2014
HP comments on the recent cyber breach at retailer Home Depot illustrating the high levels of vulnerability surrounding the lucrative retail business
 
Using secure enterprise workspaces in BYOD environments
Data Protection : 03 September, 2014
Dell SecureWorks provides five compelling reasons for deploying secure enterprise workspaces in BYOD environments in a balanced approach to secure business operations
 
Risk management event to explore balance between opportunity and security
Data Protection : 02 September, 2014
Security strategy director at NTT Com Security to present on shedding old style constraints at the Gartner Security and Risk Management summit in London
 
IP reputation service integrated with security intelligence platform
Data Protection : 22 August, 2014
The BrightCloud IP reputation service from Webroot is being used for providing threat intelligence input to the security intelligence platform from LogRhythm
 
Automatic logging on exposes users to high cyber risk
Data Protection : 20 August, 2014
Research from Intercede shows the extent to which users are automatically logging on to e-mail and social network sites or sharing passwords with other people
 
Study examines the threat of rogue ex-employees
Data Protection : 14 August, 2014
Continued access to critical data by former employees is the theme of a report issued by Intermedia on insider threat protection
 
Risk assessment software helps investigate compromised user credentials
Data Protection : 14 August, 2014
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
 
Online security top of the list for retail buyers
Data Protection : 13 August, 2014
Survey of retail consumers shows that improved online security tops the list of requirements for customer satisfaction
 
Secure USB devices with BadUSB protection
Data Protection : 12 August, 2014
The IronKey range of secure USB devices from Imation isn't vulnerable to the BadUSB malware designed to attack the device itself
 
Application delivery controller integration with certificate intelligence center
Data Protection : 11 August, 2014
A10 Networks has gained support for its application delivery controllers from Symantec from its Certificate Intelligence Center for improved management of critical security information
 
Additional features for Application Delivery Controller
Data Protection : 07 August, 2014
A10 Networks is providing extra security features for its Application Delivery Controller to help organizations combat evolving threats
 
Organizational weak links contribute to increasingly dynamic threat landscape
Data Protection : 06 August, 2014
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
 
Application management crucial to business protection
Data Protection : 31 July, 2014
Tufin Technologies comments on the major network disruption which could be experienced by businesses that are increasingly dependend on applications
 
Corporate data risks through mixing personal and business applications on one device
Data Protection : 31 July, 2014
Florian Malecki, international product and marketing director, Dell Security examines the corporate security problems associated with the BYOD culture
 
Cloud based Unified Threat Intelligence
Data Protection : 31 July, 2014
Cloud based unified threat intelligence service available from Bit 9 and Carbon Black for protection against advanced threats and targeted attacks
 
Breach level index shows extent of data records compromised
Data Protection : 31 July, 2014
According to SafeNet's Breach Level Index for 2Q14, 375 million customer data records were compromised with the retail sector being the hardest hit
 
PCI inertia maintains high cyber risk for retailers
Data Protection : 30 July, 2014
Not enough retailers are taking cyber security seriously despite the proven vulnerability of the sector and concern from within the retail industry
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo