Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
Data Protection
Data privacy protection for investment management company
Data Protection : 12 January, 2015
Campbell Global is using DatAdvantage and IDU Classification Framework from Varonis for ensuring the security and privacy of its data
Enterprise security will become a business challenge in 2015
Data Protection : 08 January, 2015
Rob Lay, Solutions Architect for Enterprise and Cyber Security in UK & Ireland at Fujitsu explains the growing challenges associated with enterprise security
Reducing Cyber Risk with Trustworthy Best Practices
Data Protection : 08 January, 2015
Ed Paradise, Vice President of Engineering at Cisco explains industry best practice for cyber risk reduction
Partnership provides security for SAP ERP users
Data Protection : 11 December, 2014
SAP has agreed on reselling the HP Fortify application for security protection and the identification of software vulnerabilities
Sony Pictures incident an attack of free speech
Data Protection : 02 December, 2014
Thales comments on the notion that attacking the arts industry by nation states as an objection to film contents could be an attack on the right to free speech itself
UK consumers demand harsher penalties for data breaches
Data Protection : 01 December, 2014
Survey conducted by LogRhythm reveals the extent of frustration endured by UK consumers at data breaches suffered by organisations and the need for harsher penalties
UK and USA to collaborate on joint cyber crime initiative
Data Protection : 24 November, 2014
Cyber police exchange scheme could represent the start of a new approach in the fight against international cyber crime
Security policy orchestration for multiple platforms
Data Protection : 24 November, 2014
Tufin adds Amazon web services support to its security policy orchestration suite providing centralised security policy management across platforms
UK troops advised to leave personal devices at home
Data Protection : 24 November, 2014
Fears of hacking have resulted in British troops being advised not to take personal computing equipment with them when deployed on exercises
Compromised privileged accounts key to advanced targeted attacks
Data Protection : 21 November, 2014
Study by CyberArk identifies privileged accounts as being central to the latest wave of advanced targeted attacks
Advice for securing vulnerable webcams
Data Protection : 21 November, 2014
Kaspersky Lab provides advice on preventing webcam snooping after website discovered which streams unprotected footage
Managed security service for early threat detection
Data Protection : 20 November, 2014
Global threat intelligence at centre of portfolio of managed security services for early threat detection by Verizon
The EU cyber taskforce should only be the beginning
Data Protection : 19 November, 2014
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals
Top IT security predictions for 2015
Data Protection : 19 November, 2014
Websense has predicted the cybersecurity arena for 2015 with healthcare, the internet of things and credit card users top of the list of attack targets
Corporate data security trust restoration
Data Protection : 14 November, 2014
Paul Hampton, Payment & Crypto management expert at SafeNet explains the four steps required to restore trust in corporate data security
Use the Power of the Pyramid to Protect Critical Data
Data Protection : 13 November, 2014
Steve Martino, Chief Information Security Officer, Vice President, Information Security at Cisco explains the prioritization requirements of data protection
Only half of UK critical business data secured
Data Protection : 13 November, 2014
Research from NTT Com Security reveals extent of insecure data and lack of insurance within the structure of UK companies
Office worker survey shows high levels of complacency over data loss
Data Protection : 12 November, 2014
Imation has performed a study into company employee views on data risk and the vulnerability of confidential data in the hands of remote workers
Collaboration group to investigate connected vehicle security
Data Protection : 10 November, 2014
Intercede is part of a new collaborative group of industry partners examining the security implications of the emerging technology of connected vehicles
Cyber insurance goes hand in hand with good practices
Data Protection : 10 November, 2014
LogRhythm comments on the UK cyber-insurance market study and the need to combine insurance cover with good practices in protecting IT assets
Interactive incident timeline speeds up investigations
Data Protection : 07 November, 2014
The UserInsight behaviour analytics software from Rapid7 now features interactive incident timeline for faster investigation capability
Maintaining effectiveness in a changing security market
Data Protection : 20 October, 2014
Kevin Townsend explains the way the IT security industry is changing and how companies need to be both efficient and effective in what they do
Measuring success in threat management programmes
Data Protection : 16 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
Creating an IT Metrics programme to Safeguard the Network
Data Protection : 14 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco Systems explain the importance of setting up a unified IT security metrics programme
Low cost high security encrypted hard drive
Data Protection : 10 October, 2014
Imation has produced a high performance external USB 3.0 hard drive with cloud-based management console and Government grade security
FIPS validation for cloud visibility and data protection
Data Protection : 08 October, 2014
Cryptographic Module Validation Programme from CipherCloud gains Federal Information Processing Standards (FIPS) validation
Continuous file assessment gives security the edge in finding malware
Data Protection : 02 October, 2014
Terry Greer-King, Director of Cyber Security at Cisco explains Advanced Persistent Threats and the ability of modern security software in assessing vulnerabilities
Plain language PSN connectivity white paper
Data Protection : 29 September, 2014
McAfee is making it easy for companies needing to connect to the Public Services Network (PSN) in the UK through a plain language white paper
Technology partnerships extended to boost data security
Data Protection : 25 September, 2014
The Cipher Technology Partner Programme run by SafeNet now has further membership extending its reach and providing greater opportunities for data protection
Apple device management in the cloud
Data Protection : 23 September, 2014
The Centrify User Suite now includes the Mac 2014.1 component to manage and secure Mac and iOS more efficiently
How to keep contactless payment credentials secure
Data Protection : 22 September, 2014
Bitdefender explains the top security threats associated with the booming contactless payment industry with monthly spending now three times that of last year
Cyber threat programme assessment and development
Data Protection : 15 September, 2014
Rapid7 is now offering programme development services for cyber security through its Global Strategic Services Practice
Integration improves mitigation and response times
Data Protection : 11 September, 2014
UserInsight from Rapid7 now operates in conjunction with HP ArcSight ESM providing faster and more effective threat mitigation
Latest breach shows retail industry to be prime cyber attack target
Data Protection : 10 September, 2014
HP comments on the recent cyber breach at retailer Home Depot illustrating the high levels of vulnerability surrounding the lucrative retail business
Using secure enterprise workspaces in BYOD environments
Data Protection : 03 September, 2014
Dell SecureWorks provides five compelling reasons for deploying secure enterprise workspaces in BYOD environments in a balanced approach to secure business operations
Risk management event to explore balance between opportunity and security
Data Protection : 02 September, 2014
Security strategy director at NTT Com Security to present on shedding old style constraints at the Gartner Security and Risk Management summit in London
IP reputation service integrated with security intelligence platform
Data Protection : 22 August, 2014
The BrightCloud IP reputation service from Webroot is being used for providing threat intelligence input to the security intelligence platform from LogRhythm
Automatic logging on exposes users to high cyber risk
Data Protection : 20 August, 2014
Research from Intercede shows the extent to which users are automatically logging on to e-mail and social network sites or sharing passwords with other people
Study examines the threat of rogue ex-employees
Data Protection : 14 August, 2014
Continued access to critical data by former employees is the theme of a report issued by Intermedia on insider threat protection
Risk assessment software helps investigate compromised user credentials
Data Protection : 14 August, 2014
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Online security top of the list for retail buyers
Data Protection : 13 August, 2014
Survey of retail consumers shows that improved online security tops the list of requirements for customer satisfaction
Secure USB devices with BadUSB protection
Data Protection : 12 August, 2014
The IronKey range of secure USB devices from Imation isn't vulnerable to the BadUSB malware designed to attack the device itself
Application delivery controller integration with certificate intelligence center
Data Protection : 11 August, 2014
A10 Networks has gained support for its application delivery controllers from Symantec from its Certificate Intelligence Center for improved management of critical security information
Additional features for Application Delivery Controller
Data Protection : 07 August, 2014
A10 Networks is providing extra security features for its Application Delivery Controller to help organizations combat evolving threats
Organizational weak links contribute to increasingly dynamic threat landscape
Data Protection : 06 August, 2014
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Application management crucial to business protection
Data Protection : 31 July, 2014
Tufin Technologies comments on the major network disruption which could be experienced by businesses that are increasingly dependend on applications
Corporate data risks through mixing personal and business applications on one device
Data Protection : 31 July, 2014
Florian Malecki, international product and marketing director, Dell Security examines the corporate security problems associated with the BYOD culture
Cloud based Unified Threat Intelligence
Data Protection : 31 July, 2014
Cloud based unified threat intelligence service available from Bit 9 and Carbon Black for protection against advanced threats and targeted attacks
Breach level index shows extent of data records compromised
Data Protection : 31 July, 2014
According to SafeNet's Breach Level Index for 2Q14, 375 million customer data records were compromised with the retail sector being the hardest hit
PCI inertia maintains high cyber risk for retailers
Data Protection : 30 July, 2014
Not enough retailers are taking cyber security seriously despite the proven vulnerability of the sector and concern from within the retail industry
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo